Preview

Proceedings of Telecommunication Universities

Advanced search
Vol 6, No 3 (2020)
View or download the full issue PDF (Russian)

RADIO ENGINEERING AND COMMUNICATION

6-16 2677
Abstract
There is an approach of the communication satellites comparison presents in the paper. It can be applied in situations when it is necessary to make the promptly and reasonably decision on the communication satellites choice in conditions of limited time for decision-making. The stated choice method differs from the known ones by taking into account the overall characteristics of the satellite, which significantly affect the quality of its intended tasks. The estimated characteristics in the work are the availability, bandwidth, noise immunity, reliability and controlability of the satellite.. The paper also presents the approbation results of the propsed method to determine the most effective communication satellite in a geostationary orbital grouping belonging to the Russian Federation, involved in the organization of information exchange of mobile subscribers on the territory of the state.
17-27 2436
Abstract
Currently, information conflicts are an integral part of conflicts between different organizational and technical systems in many areas of activity. The solution to the problem of achieving information superiority in an information conflict in the special sphere is assigned to special purpose info-telecommunication systems. According to the author's approach, they include telecommunications and information components, as well as monitoring and impact subsystems. At the same time, the information conflict under consideration is characterized by the presence of two opposing special purposes infocommunication systems, which correspond to two different sides of the conflict. In each infocommunication systems, the means of the monitoring subsystem are designed to provide control systems with the necessary amount of operational information for making decision, and the means as part of the influence subsystem are making it difficult to collect information from the opposing special purposes infocommunication system. Conflict interaction between infocommunication system can be represented in the form of information contacts by means of observation and influence with telecommunication devices as part of the opposing infocommunication systems. In this regard, the formalization of these information contacts and analyzing the potential contribution of these subsystems to the information superiority achievement in the information conflict is an urgent scientific task. The aim of the work is to develop a model of contacts and to evaluate the effectiveness of various options for the distribution of telecommunication devices between the the monitoring subsystems and the impact of the opposing side from the standpoint of achieving information superiority in an information conflict.
28-37 1957
Abstract
The article proposes algorithms for allocating channel resources in a heterogeneous radio access network that simultaneously uses the frequency resources of a 5G network and an unlicensed wireless access network. It is shown that the use of a balancer in such network will make it possible to level the problem of the mutual wireless technologies influence, in particular, interference. To implement the algorithms, it is proposed to use the capabilities of the cloud server architecture.
38-46 5521
Abstract
The article deals with the problem of designing a protocol for the interaction of movable tags and stationary readers based on measuring the spreading time of a radio signal. The issue of reducing the number of transmitted messages is analyzed. Common description of the proposed protocol, the messages and main interaction scenarios structure are provided.

INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT

48-57 1841
Abstract
The article presents the author's method testing results for identifying the processor architecture of the executable code based on machine learning. In the third final part of the cycle, its qualitative indicators are determined: accuracy, completeness and F-measure for the executable files of the Debian build. There are investigated the applicability limits of the architecture identification method for four conditions: the file header absence, different sizes of machine code, partial code destruction, and the presence of instructions from several architectures. We can observe the identified disadvantages of the proposed method and ways to eliminate them, as well as the further direction of its development.
58-65 2619
Abstract
The article proposes a method for validating mathematical models represented by oriented weighted signed graphs using an efficient control algorithm. The method considers the validated model in terms of spectral properties of the graph adjacency matrix represented by a fuzzy cognitive map (FCM). Using an efficient control algorithm, you can determine the eigenvector direction of the adjacency matrix. This property defines the criteria for checking the FCM.
66-74 3851
Abstract
The article discusses the security management capabilities of critical information infrastructures. It discusses approaches to developing security policies that don’t lean on assessing residual risks and identifying a fixed list of threats. We examine the possibility of building information security management systems based on monitoring of security events. A formal description of security events as well as relevant protection methods is proposed. The paper introduces an order relation for information security systems comparison and asymptotic CII security control implementation.
75-90 1331
Abstract
The problem of planning data packet processing in a pipeline system with a time limit on the duration of its operation intervals is considered. The solution of the problem involves determining the composition of data packets, the composition of groups of data packets processed during these time intervals, and the schedules for processing packets of each group. To optimize solutions, the hierarchical game theory is applied. Conditions have been introduced that allow you to determine packages that are processed or readjusted to processing, which causes maximum downtime of pipeline segments. A method for constructing effective group compositions is proposed, which involves excluding packages that are determined in accordance with these conditions and placing packages that are not included in them in groups.

YOUNG SCHOLARS RESEARCH

92-99 2413
Abstract
One of the most promising application of the digital watermarking is the selective image authentication (SIA) systems. In order to implement such a system one requires an embedding algorithm with an appropriate capacity. In addition, an embedding method is to be robust for the class of non-malicious manipulations which the SIA system is designed for. We propose the new method which has a significant embedding capacity while still being tolerant to JPEG compression, brightness and contrast adjustments. This was possible due to the extension of the well-known discrete wavelet transform embedding technique. We propose two-step embedding scheme and the use of image histogram equalisation and recovering operations. The experiment results show acceptable tolerance to JPEG compression, brightness and contrast adjustments with good visual quality in terms of PSNR just after embedding.
100-106 1945
Abstract
The paper describes the universal approach for monitoring the data storage of a globally distributed cloud computing system, which allows you to automate creation of new metrics in the system and predict their behavior for the end users. Since the existing monitoring software products provide built-in scheme only for system metrics like RAM, CPU, disk drives, network traffic, but don’t offer solutions for business functions, IT companies have to design specialized database structure (DB). The data structure proposed in this paper for storing the monitoring statistics is universal and allows you to save resources when orginizing database monitoring on the scale of the GDCCS. The goal of the research is to develop a universal model for monitoring and forecasting of data storage in a globally distributed cloud computing system and its adequacy to real operating conditions.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)