Preview

Proceedings of Telecommunication Universities

Advanced search
Vol 2, No 1 (2016)
View or download the full issue PDF (Russian)
5-8 199
Abstract

The SAW sensor offers advantages in that it is wireless, passive, small and has varying embodiments for different sensor applications. In addition, there are a variety of ways of encoding the sensed data information for retrieval. SAW sensors are capable of measuring physical, chemical and biological variables.This paper will present a spread spectrum approach using orthogonal frequency coding (OFC) for encoding the SAW sensor.

8-12 173
Abstract

There is a significant packet traffic rise in the radio access networks and especially video traffic. The eMBMS technology application in LTE networks can be of great use in subscribers load increase. Channel resource allocation for LTE eMBMS is considered and the network throughput is discussed.

12-18 214
Abstract

We tried to explain problem of producing password tolerant to video-recording attacks. This password based on a table of correspondences of input and password symbols. Attacks to system of password protection are considered, ratios for estimates of probabilities of guessing of the password and password guessing for different number of possible attacks to a password entry procedure are received.

18-22 244
Abstract

As the practice of troubleshooting during the installation of PON shows, the presence of excess fiber bends causes the large losses at a wavelength of 1490 nm, whereas not enough tight fixations
of optical connectors greatly affects the attenuation at a wavelength of 1310 nm. Theoretical analysis of losses caused by optical fiber macrobends and losses at a longitudinal gap for different wavelengths used in PON was carried out to explain this feature.

23-27 239
Abstract

Data on development of single-mode microstructured fibers with a 35 micron core diameter different from analogs by the higher bending resistance property are provided. It is shown that the single-mode regime of operation is reached in fibers due to the phenomenon of differential mode attenuation caused by a distinction in leakage intensity of fundamental and higher-order modes.

28-32 226
Abstract

Results of research of dependence of connectivity of a network on distribution of knots and influence of distribution of knots and their parameters on solutions of tasks of creation of networks with the set requirements to connectivity are given in this article.

32-37 236
Abstract

This work presents method for design of specialized refractive index profile that provides differential mode delay decreasing over “C”-band for silica few-mode optical fibers with enhanced core diameter in comparison with known commercial samples.

37-42 238
Abstract

The article is devoted to the investigation of the possibilities to increase the length of the single-span section of the fiber-optical communication line with dense wavelength division multiplexing
without using remote power supply. The work includes proposed and simulated variants of schemes of the single-span sections with linear optical amplifiers EDFA with remote pump signal.
The results can be used as a recommendation for amplifier developers and communication line designers.

43-47 220
Abstract

The article is devoted to development architecture of neural network for traffic classification. Dependence of quality of neural network’s recognition of signals given on it entrance from parameters of a neural network is analyzed. On the basis of results of the analysis the possibility of creation of an optimum neural network is shown, and further it is possible to work with various entrance values, for example values of traffic.

47-52 207
Abstract

This article considers two informed encoder stegosystems building methods. The first one uses improved spread spectrum signals, the second one uses quantized projective modulation/demodulation. The article represents comparative analysis of their embedding speeds, wrong information bit extraction probabilities, false alarm and stegosystem miss probabilities

52-57 193
Abstract

The advantage of watermarking usage is it does not require to store of metadata in extra memory space. However, JPEG algorithm, being a common method for image compression, leads to break-in of strict image authentication. An improved algorithm of selective image authentication tolerant to JPEG compression is presented. Proposed method is based on central finite differences and 3-bit quantization of the feature vector. The experimental results show that algorithm has strong resistance to JPEG compression with quality factor Q ≥ 8, the high probability of malicious tampering detection and low order of calculation complexity comparing with the previous presented. A visual quality (PSNR) of the watermarked image is higher than 40 dB.

58-62 198
Abstract

The quality of a tested paths of the packet network connection is assessed by subjective and objective methods. Methodology for the subjective (expert) estimation described in Recommendation ITU R. 800 and known as the MOS method (Mean Opinion Score). In accordance with Recommendation ITU G. 107 the basis of an objective methodology based on E-model.

63-67 217
Abstract

Calculation of hybrid electrical system parameters for communication center, which can be located in different climatic conditions, is presented. The article is generalization of generated power calculations obtained for solar panels and wind turbines for different regions. The essence of the problem is the lack of methods, which allow to determine rational structure of alternative energy sources. The article contains technical and economic indicators analysis of alternative energy sources, wind and solar potential in Russia.

68-72 235
Abstract

LTE networks become increasingly popular in Russia. Positioning of objects in LTE networks by measuring signal time of arrival is one of existing algorithms based on network infrastructure. Computer modelling is the way of measuring positioning accuracy by statistical approximation.

72-77 171
Abstract

Modeling and study of shielding properties of protective materials and coatings is one of the effective passive methods in problems of electromagnetic compatibility of units and blocks RF and microwave devices and technical means of information transmission, improve their noise immunity.

77-82 319
Abstract

With the increasing popularity of unmanned aerial vehicles (UAVs), and their availability in 2014-2015 significantly increased the number of accidents and collisions with obstacles. In this regard, in 2015 in the Russian Federation, as well as other countries the laws governing piloting rules and UAV flights were adopted. One of the main provisions of these laws was the mandatory registration of all UAV 250 grams heavier. In connection with the advent of the regulatory framework regarding the UAV sharply raises the question of the illegal exploitation of undocumented UAV persons who do not have permission to perform the flight. Decision of the situation is to develop equipment that will allow to fix the fact launch the UAV, its coordinates and the coordinates of the operator, as well as an emergency landing of the UAV. This paper proposes a method and an algorithm for the detection of UAVs and associated flight parameters based on the analysis of network traffic, intercepted the radio.

82-89 239
Abstract

Wideband signals allow high-level noise immunity in data transmission channels when signal-to-noise ratio is close to one or less than one under certain conditions. Nowadays wideband
signals are commonly used in wireless data transmission systems. One of the modern tasks is the selection and processing of wideband signals. Possibility of data rate increasing is also introdused.

89-95 182
Abstract

Discusses the quantization noise arising in the codec working in wavelet space, and the method of adaptation psychoacoustic model AAS (AMP AAS) to the calculation of the masking performed
in the wavelet domain.

95-98 152
Abstract

Authentication of binary image is a very important approach in order to provide security especially of both medical and police databases. However it is impossible to use directly well-known
methods of gray-scale image authentication with digital watermarking. The technique with the use of special image compression by arithmetic codes for solution of this problem is proposed. Experimental results regarding possible authenticator sizes and quality of images just after embedding are presented.

99-103 176
Abstract

This paper presents an analysis of the main characteristics of the most popular positioning methods in WSN. The paper discusses also the dependence of position error on the relative error in distance measurements and on the number of anchors, in order to determine, in the future, an optimal positioning method based on specific conditions and requirements.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1813-324X (Print)
ISSN 2712-8830 (Online)