Vol 6, No 4 (2020)
View or download the full issue
PDF (Russian)
EDITORIAL
INSTRUMENTATION, METROLOGY AND INFORMATION-MEASURING DEVICES AND SYSTEMS
16-27 1780
Abstract
This work presents an alternative method for evaluating the reflection coefficient at a detachable connection of single-mode optical fibers based on the results of the analysis of images of the contaminated end surface of the ferrule of a pair of connectors of the studied joint, obtained with a standard field set of video diagnostics of the state of fiber-optic connectors. The results of experimental verification of the proposed method are presented, which have demonstrated the potential of its use in practical applications of "contactless" determination of the reflection coefficient on a fiber-optic connector.
28-34 2203
Abstract
The estimation of displacements, rotation angle and other deformation of images is an urgent problem in the intelligence video recording system. One of the main tasks in assessing image deformations is to increase the speed of data processing. Significant amounts of information contained in a television signal limit the possibilities of using brute force methods, which are a universal solution for estimating unknown parameters. The paper considers the problem of estimating the displacement and angle of rotation under the influence of additive and multiplicative interference for the spatial-temporal alignment of television signals. Reducing the processing time is carried out through the use of an iterative procedure for estimating parameters by successive approximation with separate estimation of the angle of rotation and displacement.
RADIO ENGINEERING AND COMMUNICATION
36-44 1969
Abstract
This research is devoted to the investigation of the relay multi-stage relay MIMO (Multiple-Input Multiple- Output) of cellular communication with antenna arrays at each stage of transmission, in which parallel independent subchannels for data transmission are formed, are considered. The possibility of minimizing the error probability per bit of transmitted information is investigated while using the method of separate optimization of each transmission stage and the threshold method for selecting energetically strong subchannels. The presented simulation results in the case of a multipath channel with Rayleigh signal fading confirm the high efficiency of the proposed approach.
The Vehicles Positioning in Ultra-Dense 5G/V2X Radio Access Networks Usingthe Extended Kalman Filter
45-59 1575
Abstract
This work is devoted to the study of mathematical models of vehicle positioning in ultra-dense V2X / 5G radio access networks using the extended Kalman filter. Based on the study of the probability of line-of-sight availability in the conditions of ultra-dense distribution of reference radio access stations and vehicles, as well as existing mathematical prototype positioning models, a new simulation model for constructing the trajectory of a vehicle has been developed to assess compliance with the requirements for the accuracy of coordinate assessment on the example of the scenario of priority passage of intersections. The simulation model implements the procedures for collecting primary angle and rangefinder measurements by reference stations received from the vehicle for subsequent secondary processing using the extended Kalman filter, as a result of which the vehicle trajectory is built in real time. In contrast to the existing prototype models, the simulation model developed in this work makes it possible to assess compliance with the specified requirements and other specifications depending on the current conditions of line-of-sight availability, as well as the accuracy of collecting primary angle measurements determined by the antenna array installed on the support device. The results of simulation are consistent with the known estimates of prototype models and confirm the possibility of achieving an accuracy of up to 1 m for a traffic control scenario with an error in determining the angle of arrival of a signal of 2 °.
60-68 2436
Abstract
An approach is developed for sharing the resource of the mobile object communication system and the local radio navigation system based on the integration of their topologies according to the criterion of electromagnetic availability of mobile stations simultaneously to several base stations of the network. This approach can be used in the design of navigation and communication systems and navigation equipment of the consumer.
INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT
70-79 2059
Abstract
The purpose of this study is to develop a decision support system that will allow, for the given conditions of using the cryptosystem, to choose the most appropriate implementation of the post-quantum key encapsulation mechanism. In the first part of the series of articles, the problem of choosing the optimal implementation of the post-quantum key encapsulation mechanism is presented as a multi-criteria choice problem. Decision-making methods that are best applicable to the problem under consideration have been determined. An algorithm for solving the problem has been developed. A web application has been designed that implements the functionality of a decision support system.
80-90 2237
Abstract
The functioning of almost any organization to one degree or another depends on how reliably its information resources are protected from various information security threats, one of which is spam. At the same time there have been many attempts to solve the problem of its detection once and for all. Research is ongoing in this subject area constantly. Based on its results, various approaches are proposed and implemented in practice. The authors previously proposed a model of e-mails that takes into account the content of e-mails, which often changes depending on the tasks performed by users and their changing information needs. This article discusses the issue of preprocessing e-mail texts in the problem of spam detection using a model of e-mails obtained on the basis of a genetic approach to the formation of mathematical models of texts, which has proven itself for solving various problems.
91-103 2010
Abstract
The security of a subject of critical information infrastructure (CII) is one of the key issues of its life support. The current approach (legal and regulatory) regulates solutions of this issue without taking into account the influence of the violator, which can have a destructive effect on the SCII. This, in our opinion, leads to significant errors in the analysis of the information security of the CII, therefore, reduces the effectiveness of the information protection means declared information security tools for CII objects. The purpose of this work is to develop a model of an information security (IS) intruder, presented in a formalized form using the "violator’s potential" parameter in the space of their implementation of destructive effects on the objects of the CII. The proposed model for assessing the capabilities of the offender to implement destructive influences on the CII subject as a set of objects is implemented in the developed cognitive map "Assessment of the IB of the CII Subject" for dynamic changes in the parameters of the "Malicious actions on the CII object" vertex.
104-110 1890
Abstract
The introduction and use of modern methods of proactive management of complex systems in decision support systems based on the collection and processing of heterogeneous data about the system and the generated precedents of events and corrective actions requires the search for new system-technical solutions for the data collection, storage and preliminary analysis, taking into account the control conditions and the characteristics of complex systems. A special feature of complex systems, such as large technical systems of industrial facilities, informatization and communication, transport, etc., is the combination of improvement stages (modernization of components) and development of systems (introduction of fundamentally new system engineering solutions) during their regular operation. In this regard, it is quite relevant to study the model for maintaining large technical systems and ways to create databases based on information reserves for decision support of proactive management. For the first time, system engineering solutions for the implementation of the original model and method based on a set of computer programs and the results of experimental tests are presented.
YOUNG SCHOLARS RESEARCH
112-119 2316
Abstract
There is proposed a model of a signal received from a complex target formed by a set of rapidly fluctuating point reflectors. Signal reception is carried out against the background of narrow-broadband active noise interference and white Gaussian noise. A functioning model of a dual-band radar system is proposed, in which the problem of classifying rapidly fluctuating point reflectors as a part of complex target against the background of interference and noise is solved. The article examines the issue of assessing the quality of this model, as well as meeting the requirements for ensuring a given value of the probability of correct classification of goals.
120-126 1527
Abstract
In this paper we can see that identified computer incidents are subject for diagnostics, during which the characteristics of information security violations are clarified (purpose, causes, consequences, etc.). To diagnose computer incidents, we can use methods of automation while collection and processing the events that occur as a result of the implementation of scenarios for information security violations. Artificial neural networks can be used to solve the classification problem of assigning diagnostic data set (information image of a computer incident) to one of the possible values of the violation characteristic. The purpose of this work is to adapt the structure of an artificial neural network that allows the accuracy diagnostics of computer incidents when new training examples appear.
ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)
ISSN 2712-8830 (Online)