Preview

Proceedings of Telecommunication Universities

Advanced search
Vol 7, No 2 (2021)
View or download the full issue PDF (Russian)

ELECTRONICS, PHOTONICS, INSTRUMENTATION AND COMMUNICATIONS

8-17 893
Abstract

The possibility of quantizing the coefficients of a digital filter in the concept of dynamic mathematical programming, as a dynamic process of step-by-step quantization of coefficients with their discrete optimization at each step according to the objective function, common to the entire quantization process, is considered. Dynamic quantization can significantly reduce the functional error when implementing the required characteristics of a lowbit digital filter in comparison with classical quantization. An algorithm is presented for step-by-step dynamic quantization using integer nonlinear programming methods, taking into account the specified signal scaling and the radius of the poles of the filter transfer function. The effectiveness of this approach is illustrated by dynamically quantizing the coefficients of a cascaded high-order IIR bandpass filter with a minimum bit depth to represent integer coefficients. A comparative analysis of functional quantization errors is carried out, as well as a test of the quantized filter performance on test and real signals.

18-23 643
Abstract

The work is devoted to searching for optimal control methods for contact center, in particular, methods for predicting the load for further calculation of required number of operators. If the number of operators is always more than required, then the owners of the contact center will incur financial losses. If there are too few employees, the quality of service will decline. Predicting the load of the contact center is required in order to bring the optimal number of operators to work in advance. It is proposed to apply chaos theory to predict the incoming load of a contact center. Positive value of the Lyapunov index indicates the chaotic behavior of the input flow of the load. To predict the load, the methods of linear and nonlinear forecasting and the method of global approximation are used. The paper presents the results of comparing these methods for the problem of predicting the incoming load of contact center.

 

24-36 952
Abstract

This work considers the application of the Radio Mobile software for calculating the coverage zones of analogue FMand digital DRM-transmitters. The requirements for the initial input data, enabling the reliable results, are demonstrated. It is shown that equality of the coverage zones of both transmitter types is determined by the proper ratio of the transmitter’s signal levels.

37-43 731
Abstract

In article the new approach to the decision of the multicriteria task of formation of resources of a transport communication network based on a combination of one of methods of multicriteria optimization ‒ a method of restrictions and a simplex a method is offered. The task is decomposed also dares stage by stage. At the first stage the set of ways of an admissible rank is formed. On the second calculation structural reliabilities of the set of ways generated at the first stage is produced. At the final stage the choice optimal on the criterion functions characterizing cost and carrying capacity, set of ways of transportation of flows corresponding pairs of nodes which is reduced to the decision of the multicriteria task of formation of resources of a transport communication network by a method of restrictions is carried out.

44-50 768
Abstract

The article presents an algorithm for evaluating the indicator of unavailability for the rain factor of satellite radio link sections, taking into account the requirements for throughput, reliability and limitation of the frequency and energy resource. In contrast to the existing approaches, the proposed problem is based on an analytical expression, which reduces the computational complexity under acceptable constraints.

51-67 655
Abstract

This work is devoted to the study of models and methods for improving posi-tioning accuracy in ultradense V2X/5G radio access networks for vehicles during maneuvers by combining range and angle primary measurements with measure-ments of inertial navigation systems in the extended Kalman filter. Onboard platformless inertial navigation system is represented by three-axis accelerometer and gyroscope modules. Integration of primary inertial measurements of acceleration and angular velocity with primary radio measurements of range and angle is carried out by converting the inertial coordinate system of the accelerometer and gy-roscope into coordinate system of vehicle using quaternions. Secondary pro-cessing of inertial and radio measurements is carried out in the extended Kalman filter. The integration results show an increase in the accuracy of estimating the trajectory of a vehicle from several meters to one meter when turning at an inter-section.

INFORMATION TECHNOLOGIES AND TELECOMMUNICATION

69-78 667
Abstract

The main provisions and principles of the synthesis of adaptive video information systems designed for recording and analyzing images of dynamic scenes at the stages of long-range detection of artificial space objects, ballistic and controlled approach to them in the middle and near zone of cooperation are considered. Based on the principle of dominant information, it is shown that the basis for the development of methods and algorithms for processing video information in on-board surveillance systems is the joint adaptive processing of video information in photodetector matrices and in digital processors in order to maximize the quality of information issued to the consumer by suppressing background and noise information by adaptive hysteresis control of the frame frequency, frame resolution and signal accumulation time in the photodetector matrix, as well as the use of parametric neural network detectors-classifiers.

79-84 595
Abstract

Paper (or plastic) certificates are considered as a means against different forgery of product quality and brand falsification. It is commonly to use barcodes or data matrices to solve this problem. However such approach does not work usually against such sophisticated attacks as cloning of certificate copies. In the current paper we propose to use a digital watermarking and estimation of inner noises of scanners and printers in order to detect cloning attack effectively. Algorithm of cloning attack detecting is presented. The probabilities of attack missing and false alarm are proved.

85-93 646
Abstract

A method is proposed for constructing digital signature schemes based on the hidden discrete logarithm problem, which meet ageneral criterion of post-quantum resistance. The method provides a relatively small size of the public key and signature. Based on the method, a practical digital signature scheme has been developed, in which the exponentiation operation in a hidden group with two-dimensional cyclicity is the basic cryptographic primitive. The algebraic support of a cryptoscheme is a four-dimensional finite non-commutative algebra with associative multiplication operation. By specifying algebra using abasis vector multiplication table with half of empty cells, the performance of signature generation and authentication procedures is improved. A public key is a triple of fourdimensional vectors calculated as images of elements of a hidden group which are mapped using two types of masking operations: 1) mutually commutative with the exponentiation operation and 2) not having this property.

YOUNG SCHOLARS RESEARCH

95-101 824
Abstract

Currently, many methodological documents have been developed that regulate approaches to the development of models of threats to information security. for information systems that process information of a different nature. There are different methods of threat development and intruder model building proposed by information security regulators, depending on the direction of their activity. To support decision-making in the process of threat modeling, a databank of information security threats has been developed. However, there are a number of contradictions in existing approaches, while the methods for identifying threats and building a model of an intruder, in most cases, involve the involvement of experts to assess the factors and conditions for the emergence of threats. In the existing methods, there is no relationship between the violator of information security. and software vulnerabilities in information systems, which does not allow building an adequate threat model without the involvement of qualified experts. The purpose of this work is to determine the potential of an information security violator. depending on its capabilities and assessing the impact of this potential on the implementation of software vulnerabilities in information systems.

 

 

102-109 861
Abstract

The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.

 

EDITORIAL



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)