<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-21495397</atom:id><lastBuildDate>Sun, 12 Apr 2026 20:18:20 +0000</lastBuildDate><category>links</category><category>mashup</category><category>mobile</category><category>technical</category><category>papers</category><category>twitter</category><category>telecom 2.0</category><category>Coldtags</category><category>big data</category><category>Google</category><category>JSP</category><category>JSOS</category><category>maps</category><category>life</category><category>events</category><category>cache</category><category>Android</category><title>Coldtags suite</title><description>Java web components, controls and JSP custom tags</description><link>http://servletsuite.blogspot.com/</link><managingEditor>noreply@blogger.com (Coldbeans software)</managingEditor><generator>Blogger</generator><openSearch:totalResults>1941</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-5343843225762455593</guid><pubDate>Sun, 26 Oct 2025 10:49:00 +0000</pubDate><atom:updated>2025-10-26T12:49:42.807+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><category domain="http://www.blogger.com/atom/ns#">links</category><title>FRUCT 39</title><atom:summary type="text">On behalf of the FRUCT TPC team, I welcome you to submit papers to the IEEE-sponsored 39th FRUCT conference that will be held on April 28-30, 2026. The conference has a low registration fee and allows online participation. The submission deadline is March 2, 2026. The conference is included in the major indexes, e.g., Scopus, WoS, DBLP, etc. Its proceedings are included in SJR, CORE, and AMiner </atom:summary><link>http://servletsuite.blogspot.com/2025/10/fruct-39.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-9131571210918249146</guid><pubDate>Sun, 12 Oct 2025 12:17:00 +0000</pubDate><atom:updated>2025-10-12T14:17:57.642+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><title>On Image Augmentation</title><atom:summary type="text">The paper considers methods of natural image augmentation, i.e. those whose application results are close to natural impacts on environmental objects that machine learning models may encounter in industrial applications: the influence of weather conditions; operating features or malfunctions of device cameras, etc. The paper presents a taxonomy of methods of natural image augmentation, which </atom:summary><link>http://servletsuite.blogspot.com/2025/10/on-image-augmentation.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-5492351726177396255</guid><pubDate>Fri, 11 Apr 2025 14:22:00 +0000</pubDate><atom:updated>2025-04-11T16:22:35.049+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>Large Language Models in Cyberattacks</title><atom:summary type="text">The article provides an overview of the practice of using large language models (LLMs) in cyberat-tacks. Artificial intelligence models (machine learning and deep learning) are applied across various fields,with cybersecurity being no exception. One aspect of this usage is offensive artificial intelligence, specificallyin relation to LLMs. Generative models, including LLMs, have been utilized in </atom:summary><link>http://servletsuite.blogspot.com/2025/04/large-language-models-in-cyberattacks.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-6789744774689600228</guid><pubDate>Thu, 06 Jun 2024 14:52:00 +0000</pubDate><atom:updated>2024-06-06T16:52:52.554+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On Certification of Artificial Intelligence Systems</title><atom:summary type="text">Machine learning systems are today the main examples of the use of Artificial Intelligence in a wide variety of areas. From a practical point of view, we can say that machine learning is synonymous with the concept of Artificial Intelligence. The spread of machine learning technologies leads to the need for their application in the so-called critical areas: avionics, nuclear energy, automatic </atom:summary><link>http://servletsuite.blogspot.com/2024/06/on-certification-of-artificial.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-136074802380543650</guid><pubDate>Mon, 03 Jun 2024 18:58:00 +0000</pubDate><atom:updated>2024-06-03T20:58:44.257+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>Attacks on Machine Learning Models Based on the PyTorch Framework</title><atom:summary type="text">This research delves into the cybersecurity implications of neural network training in cloud-based services. Despite their recognition for solving IT problems, the resource-intensive nature of neural network training poses challenges, leading to increased reliance on cloud services. However, this dependence introduces new cybersecurity risks. The study focuses on a novel attack method exploiting </atom:summary><link>http://servletsuite.blogspot.com/2024/06/attacks-on-machine-learning-models.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-1523566872040965778</guid><pubDate>Mon, 25 Mar 2024 13:29:00 +0000</pubDate><atom:updated>2024-03-25T15:29:00.201+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On Real-Time Model Inversion Attacks Detection</title><atom:summary type="text">The article deals with the issues of detecting adversarial attacks on machine learning models. In the most general case, adversarial attacks are special data changes at one of the stages of the machine learning pipeline, which are designed to either prevent the operation of the machine learning system, or, conversely, achieve the desired result for the attacker. In addition to the well-known </atom:summary><link>http://servletsuite.blogspot.com/2024/03/on-real-time-model-inversion-attacks.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-8862411000302042223</guid><pubDate>Sun, 24 Mar 2024 13:21:00 +0000</pubDate><atom:updated>2024-03-24T15:21:53.908+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On the Automated Text Report Generation in Open Transport Data Analysis Platform</title><atom:summary type="text">According to UN studies, more than 60% of the population will live in cities by 2030. It is important to receive reports on changes in the transport behavior of city residents to change existing and build new transport systems. In this article, we talk about the automated report generation module for an open platform for transport data analysis. We give the classification of transport changes in </atom:summary><link>http://servletsuite.blogspot.com/2024/03/on-automated-text-report-generation-in.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-5995542171910510545</guid><pubDate>Thu, 21 Dec 2023 10:09:00 +0000</pubDate><atom:updated>2023-12-21T12:09:55.544+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On Audit and Certification of Machine Learning Systems</title><atom:summary type="text">Obviously, machine learning applications are being used more and more in a wide variety of fields. The general rule today is that in the absence of analytical models, one always turns to machine learning. In itself, machine learning has become synonymous with artificial intelligence. The reverse is also true - artificial intelligence today is machine learning. Sometimes this definition is </atom:summary><link>http://servletsuite.blogspot.com/2023/12/on-audit-and-certification-of-machine.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-8594607085959991139</guid><pubDate>Fri, 01 Dec 2023 08:03:00 +0000</pubDate><atom:updated>2023-12-01T10:03:43.302+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>Certification &amp; audit for machine learning systems</title><atom:summary type="text">Presentation on audit of machine learning systems. Auditing should be a mandatory procedure for industrial AI systems.</atom:summary><link>http://servletsuite.blogspot.com/2023/12/certification-audit-for-machine.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-1715264021809999868</guid><pubDate>Fri, 10 Nov 2023 07:00:00 +0000</pubDate><atom:updated>2023-11-10T09:00:00.137+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On the analysis of individual data on transport usage</title><atom:summary type="text">The percentage of the world&#39;s urban population is currently more than 50\% and will increase according to UN forecasts. Urban infrastructure must develop along with population growth. This article provides an overview of methods for improving the city&#39;s transport infrastructure based on data analysis. The article presents methods for reducing harmful emissions, optimizing the operation of taxis </atom:summary><link>http://servletsuite.blogspot.com/2023/11/on-analysis-of-individual-data-on.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-5582138397987301886</guid><pubDate>Thu, 09 Nov 2023 13:36:00 +0000</pubDate><atom:updated>2023-11-09T15:37:27.816+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>A Survey of Model Inversion Attacks and Countermeasures</title><atom:summary type="text">This article provides a detailed overview of the so-called Model Inversion(MI) attacks. These attacks aim at Machine-Learning-as-a-Service (MLaaS) platforms, and the goal is to use some well-prepared adversarial samples to attack target models and gain sensitive information from ML models, such as items from the dataset on which ML model was trained or ML model&#39;s parameters. This kind of attack </atom:summary><link>http://servletsuite.blogspot.com/2023/11/a-survey-of-model-inversion-attacks-and.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-6831559725746423706</guid><pubDate>Fri, 02 Jun 2023 13:53:00 +0000</pubDate><atom:updated>2023-06-02T15:53:06.924+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><category domain="http://www.blogger.com/atom/ns#">telecom 2.0</category><title>GSMA Open API</title><atom:summary type="text">GSMA announced the creation of open telephony interfaces for third-party providers.
Lack of third party support has always been the Achilles&#39; heel of telecom, both wired and wireless.
The need for such APIs is obvious, attempts have been made to create them, but there is no result.
Will a new attempt succeed or is it already too late?

from our presentation on FRUCT-2023</atom:summary><link>http://servletsuite.blogspot.com/2023/06/gsma-open-api.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-1470229077139737608</guid><pubDate>Wed, 19 Apr 2023 10:27:00 +0000</pubDate><atom:updated>2023-04-19T12:27:21.074+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><category domain="http://www.blogger.com/atom/ns#">telecom 2.0</category><title>Local Services Based on Non-standard Wi-Fi Direct Usage Model</title><atom:summary type="text">This article discusses a new model for building applied mobile services that use location information and operate in a certain limited spatial area. As a basis for building such applications, a new interpretation of the standard features of Wi-Fi Direct is used. The Wi-Fi Direct specification, in addition to defining the form of device connection, also introduces the concept of a service, when </atom:summary><link>http://servletsuite.blogspot.com/2023/04/local-services-based-on-non-standard-wi.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-3828190456372601309</guid><pubDate>Mon, 03 Oct 2022 10:57:00 +0000</pubDate><atom:updated>2022-10-03T12:57:56.134+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">events</category><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><title>On Software Defined Radio Issues</title><atom:summary type="text">Our presentation for MTTW&#39;22</atom:summary><link>http://servletsuite.blogspot.com/2022/10/on-software-defined-radio-issues.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-472438168397959096</guid><pubDate>Tue, 03 May 2022 06:16:00 +0000</pubDate><atom:updated>2022-05-03T08:16:10.361+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><title>On a formal verification of machine learning systems</title><atom:summary type="text">The paper deals with the issues of formal verification of machine learning systems. With the growth of the introduction of systems based on machine learning in the so-called critical systems (systems with a very high cost of erroneous decisions and actions), the demand for  confirmation of the stability of such systems is growing. How will the built machine learning system perform on data that is</atom:summary><link>http://servletsuite.blogspot.com/2022/05/on-formal-verification-of-machine.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-8888153782742041450</guid><pubDate>Sun, 01 May 2022 16:34:00 +0000</pubDate><atom:updated>2022-05-01T18:34:58.533+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>A Survey of Adversarial Attacks and Defenses for image data on Deep Learning</title><atom:summary type="text">This article provides a detailed survey of the so-called adversarial attacks and defenses. These are special modifications to the input data of machine learning systems that are designed to cause machine learning systems to work incorrectly. The article discusses traditional approaches when the problem of constructing adversarial examples is considered as an optimization problem - the search for </atom:summary><link>http://servletsuite.blogspot.com/2022/05/a-survey-of-adversarial-attacks-and.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-1850125384316916814</guid><pubDate>Fri, 25 Mar 2022 13:35:00 +0000</pubDate><atom:updated>2022-03-25T15:35:22.130+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><title>Inaugural Issue JoSCaS</title><atom:summary type="text">Journal of Smart Cities and Society
All articles are Open Access, the publisher is considering making the whole year Open Access for free to promote the newly created journal.  Another incentive to submit reports on your research.</atom:summary><link>http://servletsuite.blogspot.com/2022/03/inaugural-issue-joscas.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-7093432282859291789</guid><pubDate>Thu, 24 Feb 2022 07:47:00 +0000</pubDate><atom:updated>2022-02-24T09:47:24.086+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><title>Analysis and Traffic Management in Smart Cities</title><atom:summary type="text">This article examines the issues of traffic management in the city. It is well known that cars are a significant contributor to urban air pollution. Accordingly, the management of transport in the city is one of the imperative tasks in terms of supporting the environment and ensuring urban development. Such management is impossible without collecting information on traffic flows in the city. It </atom:summary><link>http://servletsuite.blogspot.com/2022/02/analysis-and-traffic-management-in.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-8602683529262167348</guid><pubDate>Thu, 16 Dec 2021 08:30:00 +0000</pubDate><atom:updated>2021-12-16T10:30:53.370+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On Trajectories in Moscow Subway</title><atom:summary type="text">Along with the continuous growth of megacities, their transportation systems have become increasingly large and complex. The use of transportation systems by passengers directly reflects the changes that occur in the urban environment - for this reason, the study of urban mobility is an important task of digital urbanism. In particular, this paper is devoted to the study of spatial patterns (</atom:summary><link>http://servletsuite.blogspot.com/2021/12/on-trajectories-in-moscow-subway.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-2677388940475113132</guid><pubDate>Tue, 07 Dec 2021 14:13:00 +0000</pubDate><atom:updated>2021-12-07T16:13:57.883+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">big data</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On robust machine learning</title><atom:summary type="text">Our review for ongoing robust machine learning projects</atom:summary><link>http://servletsuite.blogspot.com/2021/12/on-robust-machine-learning.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-1183069982653395721</guid><pubDate>Thu, 26 Aug 2021 07:24:00 +0000</pubDate><atom:updated>2021-08-26T09:24:30.848+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>Journal of Smart Cities and Society</title><atom:summary type="text">You are welcome to submit your papers: Journal of Smart Cities and Society</atom:summary><link>http://servletsuite.blogspot.com/2021/08/journal-of-smart-cities-and-society.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-6110312271024768781</guid><pubDate>Wed, 04 Aug 2021 21:16:00 +0000</pubDate><atom:updated>2021-08-04T23:16:55.397+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>How to build a hyper-local Internet</title><atom:summary type="text">The paper describes the model of hyper-local Internet.  This refers to a set
of Internet resources that are, to one degree or another,relevant (useful) for users located in a certain limited area.  For example,these resources discuss the functioning of a housing complex, an educational institution, contain information about local services, etc.  The paper proposes both a model for organizing the </atom:summary><link>http://servletsuite.blogspot.com/2021/08/how-to-build-hyper-local-internet.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-4172068309818734059</guid><pubDate>Thu, 13 May 2021 14:37:00 +0000</pubDate><atom:updated>2021-05-13T16:37:42.355+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">telecom 2.0</category><title>On the New Architecture of Location-Based Services</title><atom:summary type="text">This article discusses an alternative programming model for services that use location information. The paper proposes a new architecture for such services, which does not require users to share information about their location with service providers (services). This architecture is based on the author&#39;s proposed network spatial proximity model, where geocomputation is replaced by direct </atom:summary><link>http://servletsuite.blogspot.com/2021/05/on-new-architecture-of-location-based.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-7370574988469130923</guid><pubDate>Mon, 15 Feb 2021 06:58:00 +0000</pubDate><atom:updated>2021-02-15T08:58:34.916+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">links</category><category domain="http://www.blogger.com/atom/ns#">papers</category><title>On One D2D Usage Model for 5G Networks</title><atom:summary type="text">This article discusses a new model for using D2D interaction and proximity services (ProSe). This model allows telecommunications operators to offer their customers a micro-positioning system that will allow users (customers) of the service to offer information services (information services) to mobile subscribers who find themselves in a certain specified area. Applications of this kind of </atom:summary><link>http://servletsuite.blogspot.com/2021/02/on-one-d2d-usage-model-for-5g-networks.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-21495397.post-8459584595505716310</guid><pubDate>Mon, 10 Aug 2020 17:56:00 +0000</pubDate><atom:updated>2020-08-10T19:56:54.695+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">papers</category><category domain="http://www.blogger.com/atom/ns#">technical</category><title>International Conference on Sustainability and Climate Change</title><atom:summary type="text">
City railways – who are their passengers?
In this paper, the approaches to forecasting of passenger flows for new lines of the city railway are analyzed. The article analyzes the experience gained in designing of Moscow central diameters, in the modeling and analysis of their integration with the Moscow Metro and ground urban passenger transport. The main attention is paid to how modern </atom:summary><link>http://servletsuite.blogspot.com/2020/08/international-conference-on.html</link><author>noreply@blogger.com (Coldbeans software)</author><thr:total>0</thr:total></item></channel></rss>