Preview

Proceedings of Telecommunication Universities

Advanced search
Vol 5, No 4 (2019)
View or download the full issue PDF (Russian)

INSTRUMENTATION, METROLOGY AND INFORMATION-MEASURING DEVICES AND SYSTEMS

6-14 1586
Abstract
The article presents calculating methodology for the detection range, recognition and identification of a thermal-imaging equipment based on threshold temperature sensitivity and temperature resolution, including the cases when working on an inhomogeneous temperature field. The calculating methodology analysis of the action range for thermal-imaging equipment is presented with the initial data choice of the transfer characteristics links models of the thermal imaging system, object, atmosphere and human eye, computational studies are carried out.

RADIO ENGINEERING AND COMMUNICATION

16-27 507
Abstract
Algorithms for processing and determining, using a dual basis, the initial states of shift registers that form sequences similar to Gordon-Mills-Welch (GMW) sequences, which are characterized by their large number and higher structural secrecy comparing with the widely used M-sequences, are presented. It is shown that the proposed algorithms, unlike the known ones, make it possible to determine arbitrary initial states of shift registers and produce encoding of useful information, which expands the possibilities of using GMW-like sequences to solve various problems in the transmission of digital information in communication systems under electronic countermeasures.
28-36 491
Abstract
In this paper presents suggestions for the noise immunity improval of mobile satellite communications lines in difficult physical and geographical conditions through the use of automatic dynamic identification algorithms for the suitability of radio lines and the dynamic antenna orientation devices of mobile satellite communications systems. Based on the results obtained, recommendations for practical application are formulated.
37-48 477
Abstract
The article is devoted to the issues of stealth satellite radio channels with unmanned aerial vehicles (UAV) and it is consists of two parts. In the first part of this article the following questions are considered: the general statement of a system development problem of satellite model communication providing its stealth functioning by means of radio monitoring is carried out; the mathimatical apparatus for the assessing the effectiveness of ensuring spatial selectivity in the organization of satellite communication lines at hidden objects of their functioning is presented; the functioning model of the satellite communication system wich use the signal processing methods to ensure the secrecy of its functioning by means of radio monitoring is developed; in the conclusion, proposals and recommendations are formulated to ensure the secrecy of the satellite radio channel with unmanned aerial vehicles.. Since the eventual opponent a priori lacks complete reliable information about the radio monitoring signal, the second part of the article considers the methods of quasi-optimal signal processing based on auto-and intercorrelation processing, which allows to obtain a significant energy gain and detect a useful signal even at a very low level of its power at the input. The use of autocorrelation signal processing devices significantly improves the efficiency of radio monitoring (RM), which is especially important in the case of negative ratios of useful signal power and noise at the input of autocorrelation signal processing devices. The main results of the second part of the article include: a mathematical functioning model of the opponent's RM means in the conditions of taking measures to ensure the information transfer secrecy , the parameters calculations results of the satellite system provided that it is hidden from the RM means.
49-57 457
Abstract
This article suggests a method of amplitude adaptive nonlinear suppression of non-Gaussian cluter in the coherent band pass of the receiver, which retains its effectiveness in any distribution of the clutter envelope and in any signal-to-noise ratio. At the same time, for “low level” signals, as compared to clutter, the algorithms that implement this method are not inferior to known asymptotically optimal algorithms, and the proposed algorithms do not introduce losses for “high level” signals. The proposed method also ensures a stable probability of false alarm. A description of this method is given, as well as a study of its effectiveness by modeling in the MathCAD environment in the task of detecting a deterministic signal against a background of non-Gaussian clutter in the form of reflections from the sea surface. When modeling such clutter, the K-distribution is used and the internal noise of the receiver is taken into account. Research shows that the proposed method really has these advantages.
58-64 406
Abstract
The article considers the method of eigenfunctions for getting the approximated current solution to the internal problem of electrodynamics. The paper considers a polynomial frequency dependence approximation of the eigenvalues and eigenfunctions of the operator for conducting bodies. The current solutions obtained by the straightforward method and with the help of method using the comparison of two approximation types.
65-78 432
Abstract
This article presents the development of a generalized mathematical model for estimating the limits of positioning accuracy, which was studied in part 1, when determining the radio source location using the difference range and goniometric methods for particular scenarios on the plane. The results of this study were implemented in 2D models, which is a convenient tool for establishing the positioning accuracy limits and can it be practically used to substantiate the topologies of station placement in modern and advanced radio networks for solving radio communication, radar, and radio navigation problems, including adaptive beamforming for establishing and maintaining communications. Using private scenarios with three radio stations as an example, it is shown that for positioning of neighboring devices under conditions of their ultra dense distribution on the plane during the cooperation of the minimum required receivers number, the goniometer method is preferable.
79-86 465
Abstract
In this article we study the analysis and optimization principles of parameters and the mode of use the error-correcting code in the information transmission system with a reverse channel, which functions under the influence of intentional interference, its structure can be selected from the position of violation (deterioration) of the system operating. We see the developed methodology for optimizing system parameters according to the criterion of the maximum guaranteed information transfer rate for interference classes with limited average power. An assessment of the efficiency gain provided by applying the proposed optimizing methods of the channel block structure and its decoding mode is made.

INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT

88-98 4685
Abstract
This article presents morphological method of combinatorial synthesis of bus-modular systems developed by the authors, which can be used in automation systems for aggregating electronic means and telecommunication systems. Original results obtained by the authors in the field of mathematical formulation of the synthesis problem of bus-modular systems are presented. It is shown that existing mathematical models cannot be used to effectively solve the synthesis problem of this class of systems. Original multi-aspect models of bus-modular systems are proposed that take into account the different types of compatibility of the modules from which the system is synthesized. The results of the development of complex and qualimetric models of bus-modular systems, as well as original algorithms for automatic generating of objective function according to given technical-economic requirements and algorithms for automatic filtering and ranking of the morphological set of modules are presented.
99-105 1545
Abstract
The article considers the possibilities of security management of critical information infrastructures. Approaches to the construction of policies not focused on a fixed list of threats are proposed. It substantiates the possibility of building a security policy based on security events monitoring. A formal description of security events and formal model of protection mechanisms based on monitoring security events is proposed. The features of this approach for the protection of critical information infrastructures in order to improve the quality of protection are considered.
106-113 1694
Abstract
The resource problems of the traditional use of detailed radar images for reliable recognition of space objects are shown. The urgent task of forming a new type of model of radar images of space objects to determine the signs of their recognition is posed. Corresponding mathematical models of such images based on stochastic differential equations of elliptic type are presented. The adequacy of the developed models to the real radar images of a space object was assessed. It is established that for the description of radar images of space objects the most suitable is a modified model in the form of a mixed derivative of an elliptical model. To test the hypothesis about the possibility of using the radar image model when constructing descriptive recognition signs, an experiment was conducted to distinguish four different types of space objects. The experimental results showed the possibility of using a mixed derivative of the elliptical model to determine signs of recognition of space objects.
114-123 2088
Abstract
In this paper a combined model of secure cyber-physical systems for their design and verification is proposed. Within the framework of this model, a cyber-physical system is represented as a set of blocks with various properties and relationships between them. The main challenge in such model construction is to combine various approaches to the modeling of cyber-physical systems (or their elements) within a single approach. The main goal of the proposed modeling approach is to provide the ability to convert various models into each other without losing significant data about the elements of the system, as well as taking into account the emergent properties that arise in the process of their interaction. The correctness of the proposed model is validated by the example of its use for design and verification of access control system.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)