Vol 10, No 3 (2012)

Articles
HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION
Afonin M.S., Gladkov A.V., Maslennikova E.V., Chervyakov N.I.
Abstract
The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.
Infokommunikacionnye tehnologii. 2012;10(3):4-8
views
MULTILAYER PERCEPTRON PARALLEL MODEL CONSTRUCTION
Kazakov V.G., Plotnikova N.P., Tesley V.V., Fedosin S.A.
Abstract
This article contains description of multilayer perceptron programming prototype, implemented using functional programming language Erlang. Architecture of this prototype is based on the asynchronous message passing concept and principle «one neuron - one process». In the end of this article the most interesting and important results of MLP performance tests are presented.
Infokommunikacionnye tehnologii. 2012;10(3):8-15
views
SOUND SIGNAL FILTRING ALGORITHMS BASED ON U-TRANSFORM
Gai V.E.
Abstract
Algorithms of filtering sound signals based on integrated-differential (U-conversion) are reviewed. The results indicate the possibility of using the proposed algorithms for solving the task.
Infokommunikacionnye tehnologii. 2012;10(3):15-20
views
METHOD OF COMBINED APPLICATION OF FRACTIONALLY-SPACED PREEQUALIZATION AND SPREAD-SPECTRUM MODULATION FOR PLC-NETWORKS AND WIRELESS CHANNELS
Bagmanov V.K., Lyubopytov V.S., Sultanov A.K., Tlyavlin A.Z.
Abstract
In the article a method of signal processing on the transmitter side is described, utilizing jointly fractionally-spaced equalization and spread-spectrum modulation. Thus two crucial problems of digital signal reliable transmission over the distorting channel with narrowband noise are solved: fractionally-spaced preequalization compensates for intersymbol interference caused by signal dis-tortion, and spread spectrum allows transmission system to be robust against electromagnetic interference. Method efficiency in the sense of error probability and transmit power minimizing is considered.
Infokommunikacionnye tehnologii. 2012;10(3):20-28
views
SIMULATORS OF WIRELESS MANET-NETWORKS
Zholobov A.N., Prozorov D.E., Romanov S.V.
Abstract
Simulators of wireless networks, allowing to research and develop own routing protocols are considered in the article. Criteria of an estimation of network simulators and their advantages and limitations are denoted.
Infokommunikacionnye tehnologii. 2012;10(3):28-33
views
THE COMPATATIVE ANALYSIS OF ALGORITMS OF OPTICAL SIGNAL DISPERSION ELECTRONIC COMPENSATION
Bourdin A.V., Grigorov I.V., Tsveybelman E.V.
Abstract
Linear and nonlinear algorithms of electronic compensation of a dispersion of signals in fiber-optical lines of transfer are considered. Algorithms of an inverse filtration with restriction of a strip of frequencies and strengthening restriction, and also various variants of a nonlinear phase filtration are thus investigated. Results of modeling and the comparative analysis of these algorithms by an estimation of efficiency of indemnification of dispersion by criterion of Relay are resulted.
Infokommunikacionnye tehnologii. 2012;10(3):33-37
views
ESTIMATION OF STIRRING ACTION OF CURRENTS OF THE ELECTRIC ECHO IN MODERN TELEPHONE SYSTEMS Ivanov V.I
Ivanov V.I.
Abstract
By results of a user’s estimation of stirring action of currents of an electric echo recommendations about inclusion echo canceller devices in telephone channels on PSTN and networks under the concept «Voice over IP» (VoIP), АТМ, cellular are made, etc.
Infokommunikacionnye tehnologii. 2012;10(3):37-40
views
CONSTRUCTION OF PARALLEL SOFTWARE AGENTS’S BEHAVIOUR ALGORITHMS BY METHODS OF GENETIC PROGRAMMING
Kolchugina E.A.
Abstract
The way of parallel algorithm’s construction on the basis of matrix intermediate structure with the use of the description of algorithm in the form of treelike structure is offered. Operations over the treelike structures are entered, allowing to produce parallel algorithms by methods of genetic programming. Logic levels on which evolution of algorithms of software agent’s behaviors proceeds are described and considered.
Infokommunikacionnye tehnologii. 2012;10(3):40-44
views
APPLICATION OF QUEUNING MODELS IN MONITORING ELECTRICAL PARAMETERS
Vorobyov A.E., Lichtzinder B.Y., Raskin A.Y.
Abstract
The article describes how to determine the pre-emergency condition at the electric power facilities with queuing models in order to reduce network traffic. The method is based on the application of the algorithm «leaky bucket» and adapted for use with pulsed electric supply meters.
Infokommunikacionnye tehnologii. 2012;10(3):44-47
views
ANALYSIS OF PROCESSES ENCAPSULATION AND DECAPSULATION VIDEO STREAMS IN IPTV NETWORKS FOR THE MONITORING SYSTEM
Karjakin V.L., Karjakin D.V., Kosenko S.G.
Abstract
The research of existing methods of encapsulation and decapsulation video streams in IP-based networks. Description OSI model of IPTV systems. Recommendations are given for assessment of resource equipment and efficient use available bandwidth in IPTV networks.
Infokommunikacionnye tehnologii. 2012;10(3):47-54
views
QUALITY CONTROL TREATMENT OF HYDROCARBONS AND THEIR DERIVATIVES IN MICROWAVE TECHNOLOGY FACILITIES-BASED OPTOELECTRONIC INFORMATION TECHNOLOGY
Morozov O.G., Samigullin R.R.
Abstract
The paper presents the methods and means of upgrading technology microwave systems handle complex hydrocarbons and their derivatives, based on the use of information technology in optoelectronic monitoring channels and designed to meet the challenges of completion of the processes controlling the microwave treatment of specified quality criteria.
Infokommunikacionnye tehnologii. 2012;10(3):54-60
views
PROJECT DECISIONS MACING BASED ON «SITUATION - MANAGEMENT STRATEGY - OPERATION» MODEL TO PHYSICAL DEFENSE SYSTEM UPGRADING
Borovsky A.S., Tarasov A.D.
Abstract
It is describing method to specify required operations for physical defense system of potentially-dangerous objects creation and improvement. Method based on management strategy identifying with fuzzy situation network using.
Infokommunikacionnye tehnologii. 2012;10(3):60-67
views
ACTIVE MIND MAPS
Ruban I.A.
Abstract
In the article the problem of the information processing into knowledge is considered. The method of active mind maps is proposed for express meaning into the system of categorizing information.
Infokommunikacionnye tehnologii. 2012;10(3):67-70
views
CALCULATION OF PARABOLIC CYLINDER REFLECTOR ANTENNA
Klyuev D.S.
Abstract
The calculation of parabolic cylinder reflector antenna by 2D singular integral equation (2DSIE) method is represented in this paper. The system of 2DSIE for surface current density on the reflector and emitter calculation was reduced. The numerical algorithm of solving this system is represented. Radiation patterns of this antenna is represented.
Infokommunikacionnye tehnologii. 2012;10(3):71-77
views
NONLINEAR DISTORTIONS OF MULTIPLEXED SIGNAL IN WIRELESS LOCAL LOOP SYSTEM
Gurevich V.E., Egorov S.G.
Abstract
The aim of this paper is to analyze the effects of nonlinear distortions caused by the high power amplifier (or other nonlinear devices) and additive gaussian noise in direct-sequence code-division multiple access (DS-CDMA) systems. Analytical expression for the conditional and total probability density functions for the multiplexed CDMA signal had been derived, which could be used for obtaining the accurate error rate of the system and for specifying technical specifications for the baseband channel of DS-CDMA systems.
Infokommunikacionnye tehnologii. 2012;10(3):77-82
views
VERBAL INVORMATION ACTIVE PROTECTION: RESERVES AND NEW POSSIBILITIES
Evgrashin A.V., Maslov O.N., Ryabushkin A.V., Shashenkov V.F.
Abstract
Methods and aids of increase of confidential information (CI) protection systems from information leakage on the acoustic and vibroacoustic channels efficiency are considered in the article.
Infokommunikacionnye tehnologii. 2012;10(3):82-93
views
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
Azhmuhamedov I.M., Kolesova N.A.
Abstract
Proposed the system of protection transmission stegomessages in images, allowing to identify the image file, the contents of a suspect a hidden message, in the absence of a priori information about the presence in the stego file and the law of its incorporation, and modify images with a further possible exception of the extraction stegomessages.
Infokommunikacionnye tehnologii. 2012;10(3):93-97
views
USING NEURAL NETWORKS FOR CRYPTANALYSIS OF CIPHER «GRAPHICS ARRAY»
Orlov V.V., Alekseev A.P., Nazarenko P.A.
Abstract
This article discusses the possibility of using neural networks for cryptanalytic cipher «Graphical matrix».
Infokommunikacionnye tehnologii. 2012;10(3):98-102
views
DECISION-MACING METHODS IN COINTROLLING STAFF OF A LARGE ORGANIZATION
Buzuev A.I., Yagovkin N.G.
Abstract
This paper presents a new approach to the existence of perfect methods of decision making in management personnel Institute larger organization-support structure and to optimize the job responsibilities of staff, and manage the preparation and conduct of complex evaluation of his competency.
Infokommunikacionnye tehnologii. 2012;10(3):102-106
views
MUSEUM IN THE 21st CENTURY: INTEGRATION OF DIGITAL TECHNOLOGIES IN THE EXHIBITION SPASE
Smirnova T.A.
Abstract
The article discusses the development of museum institution at the modern stage in the light of use the digital technologies in the museum exposition, the use of new multimedia tools.
Infokommunikacionnye tehnologii. 2012;10(3):106-110
views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies