Vol 15, No 1 (2017)

Articles

MODIFICATION OF ASMUT-BLUM DATA SHARING SCHEME USING THE FRACTAL GEOMETRY METHOD

Chervyakov N.I., Kocherov Y.N.

Abstract

The paper presents schemes of information separation into parts applied for reliable information storage and obtain of distributed access to resources. It is pointed out that data sharing schemes are subjected to internal and external threats and it can compromise data sharing scheme. The Asmut-Bloom data sharing scheme and its modification using the fractal geometry as a coding function and numerical method of pieces data calculation with the modified Asmut-Bloom data sharing scheme application is considered in the article. This modification allows to separate and encode the image simultaneously without using additional algorithms and, therefore, without increasing the computational complexity. A computer simulation of the proposed algorithm using white noise and fractal sequence as a coding function was carried out. Conclusions have been made.
Infokommunikacionnye tehnologii. 2017;15(1):7-14
pages 7-14 views

METHOD OF COMPRESSION OF VOICE DATA WITHOUT A PAUSE BASED ON THE OPTIMAL LEVEL QUANTIZATION COEFFICIENTS OF THE EXPANSION PIECES OF SPEECH SIGNALS FOR EIGENVECTORS SUBBAND MATRIX

Zhilyakov E.G., Belov S.P., Belov A.S., Belov A.S., Medvedeva A.A.

Abstract

Existing techniques of compression of speech sounds without pauses, using a coarse quantization level based on a psychoacoustic model, which results in the need for the so-called subband transforms segments (vectors) samples of speech signals, allowing to obtain the other vectors subvectors which reflect the frequency properties of the input vector in the selected ranges frequency axis. That component of the sub-vectors is quantized by the level of different steps, thus achieving the accounting frequency-selective properties of human hearing. Currently, for a subband common to use transformation process output sequences decimation FIR filters (finite impulse response) tuned to respective portions frequency axis. This procedure subband transform is not optimal in the sense of minimizing the approximation error spectra initial vectors to selected frequency ranges, which leads to increased errors in data recovery on the quantized values and, as a consequence, degradation of the reproduced speech. In this connection, the authors proposed the speech data compression method without pauses, created with the use of mathematical apparatus developed on the basis of eigenvectors subband matrix, allowing adequately formulate variational conditions and solve optimization of voice data processing tasks. The proposed method of speech compression without pauses allows data depending on the starting bit of said data samples provide compression ratios up to 12 times.
Infokommunikacionnye tehnologii. 2017;15(1):14-18
pages 14-18 views

METHOD FOR PRECISION MACRO-DEFECT FORMING IN SILICA OPTICAL FIBER STRUCTURE

Andreev V.A., Bourdine A.V., Burdin V.A., Vasilets A.A., Gavryushin S.A., Evtushenko A.S., Kazakov V.S., Morozov O.G., Sevruk N.L., Sokolov E.D.

Abstract

This work presents method for precision microstructure defects “tapers” and “up-tapers” forming in conventional silica telecommunication multimode optical fibers by commercially available field fusion splicer with modified software sets. We developed technique for micro-defect geometry parameters estimation via analysis of photo-image performed after defect writing and displayed on fusion splicer monitor. Some research results of defect geometry dependence on fusion current and fusion time values re-set in splicer program are represented that provided ability to choose their “the best” combination. Also we produced experimental statistical researches of “taper” and “up-taper” diameter stability as well as their insertion loss values during their writing under fixed corrected splicer program parameters which results are presented in this paper.
Infokommunikacionnye tehnologii. 2017;15(1):18-29
pages 18-29 views

MODELING IS SECURE OF TELECOMMUNICATION CHANNELS WITH USING VIRTUALIZATION

Vasin N.N., Irbakhtin A.A.

Abstract

In modern world upgrade of protect of communications channels is essential. Modeling is one of the methods for learning new methods attacks and new methods protect. We solved this problem by using a hardware-software complex for modeling. Complex for modeling is working using with virtualization. Complex includes virtualization system VirtualBox, network simulator GNS3, routers Cisco, switches Cisco, operation systems KaliLinux, operation systems Ubuntu, program Wireshark, and program routers on the operation system Vyatta. In this paper, we consider two examples of use of the complex for modeling. The first example describes the transfer of FTP-traffic on open and secure channels. The second example describes the modeling of the DOS-attack on the server. These examples describe some modeling techniques used in the complex. We modeled the operations of networks, servers, applications and attacked them. The identified vulnerabilities are closed by means of protective measures.
Infokommunikacionnye tehnologii. 2017;15(1):29-35
pages 29-35 views

WEB APPLICATION OF ESTIMATING PROTECTION SYSTEM EFFECTIVENESS OF THE ENTERPRISE

Bakhareva N.F., Fedorov S.V.

Abstract

This article describes the WEB-application algorithm that allows to automate the audit of the company and to generate recommendations for the protection of the company in accordance with the requirements of the legislation. Moreover, it deals with the principle of the database formation. The authors describe the database according to the thematic issues of the information security for all the selected groups, private indicators and reference base, which is the master system of the protection. It is also represented the system of the group assessment, performance information security and the current reporting security of the enterprise. In the result, the authors give an algorithm of the visualization of the audit results. Using this application will reduce the resource and time which can be spent on the audit.
Infokommunikacionnye tehnologii. 2017;15(1):35-39
pages 35-39 views

STUDY OF BOUNDARY VALUES OF VPN TRAFFIC DELAYS CONSIDERING CROSS FLOWS

Lysikov A.A.

Abstract

Virtual private networks are one of the most popular services in next generation networks. When implemented in a network operator a large number of VPNs there is a conflict over the resources of the network. The paper proposes a VPN model based on Network Calculus theory, allowing to define the least upper delay bound for flow of planned VPN considering cross flow other VPNs in nested and non-nested tandems. Considered the results of a study of the proposed model. According to the results of experiments found that the greatest impact on the delay of the proposed VPN flow will have bursts of cross flows in medium and large batches route nodes. The rate competing flows will have a noticeable effect on the delay of the planned VPN flow at high loads routes nodes. Are given the recommendations for operators on the use of results in practice when planning a VPN. This model can be used as a basis for the development of specialized software package planning and allocation of network resources.
Infokommunikacionnye tehnologii. 2017;15(1):40-49
pages 40-49 views

PROSPECTS AND PROBLEMS OF THE ELECTROMAGNETIC LOCATION OF ROUTES OF UNDERGROUND EXTENDED OBJECTS BY MEANS OF UNMANNED AERIAL VEHICLES

Burdin V.A., Kubanov V.P.

Abstract

In article potential sales opportunities of a method of an electromagnetic location of routes of extended underground constructions by means of unmanned aerial vehicles (drones) are considered. Technology benefits with use of unmanned aerial vehicles are considered. Basic provisions of an electromagnetic location of routes of underground constructions are stated. The analysis of features of implementation of methods of an electromagnetic location when using drones is provided. Problems of search of the route and determination of a depth of an underground construction in case of measurement of distributions of levels of the electromagnetic field by means of unmanned aerial vehicles are in detail considered. Options of technical solutions of these problems are provided. It is shown that use of unmanned aerial vehicles for an electromagnetic location is quite real, and the problems arising at the same time have technical solutions.
Infokommunikacionnye tehnologii. 2017;15(1):49-58
pages 49-58 views

INFLUENCE OF UNCERTAINTY OF INITIAL DATA ON THE EFFICIENCY OF STATISTICAL SIMULATION MODELING NON-REFLEXIVE SYSTEM. PART 2. DIFFERENTIATION OF STOCHASTIC FACTORS ON THE EFFECT ON THE EFFICIENCY

Vaulina K.V., Maslov O.N.

Abstract

In this article considers the problem of analysis of the effect of initial data uncertainties on the results of the statistical simulation. The object of study is a complex hierarchical non-reflexive system. The uncertainty of the initial data is taken into account in the formation of random numerical values, modeling the stochastic factors that affect the process of the functioning (working) non-reflexive hierarchical system. In the first part of the article presents the SSM-model of the business process «Provision of state and municipal services» Multifunctional Center (MFC) in Tyumen region. Model has been chosen as a test object for further research. In the second part of the article presents the results of experiments on the example of the selected test model and the analysis of the obtained values. And also have been made findings on the impact of the uncertainty of initial data on the effectiveness of the SIM.
Infokommunikacionnye tehnologii. 2017;15(1):58-70
pages 58-70 views

INFORMATION TECHNOLOGIES OF RADAR REMOTE MAPPING AND MONITORING OF EXTENDED OBJECTS

Goriachkin O.V.

Abstract

The analysis of potential opportunities of use of radar technologies of the remote sensing of the earth (RSE) for search of routes of a layer pad of underground communications, such as pipe ducts, and determination of depth of their bedding is presented in the offered article. Three practical technologies of obtaining radar images, depending on options of basing of the equipment of radar-tracking systems of a zemleobzor are considered, namely: aviation or space monostatic; combined with land multistatic aviation or space; mobile and land. It is noted that the problems arising at realization of monostatic systems such as collapse of influence of an ionosphere, restriction of regulations of a radio communication, need of expansion for space of large-size antenna system, it is expedient to solve the combined radar-tracking systems of a zemleobzor. The prospects of use of mobile radar-tracking systems for subsurface sounding from a board of aircraft, multifrequency sounding, and observation of the disguised or covered purposes are shown. The option of development of the mobile radar-tracking system is described; results of a land experiment of the area are given in the mode of radiation of LChM of impulses. The main comparative charac, teristics of the aviation RSA VHFS of range developed in different years and MRLK are provided in article. As an example, results of an experiment on creation of RLI of the land surface at the movement of the car on the bridge are presented.
Infokommunikacionnye tehnologii. 2017;15(1):70-77
pages 70-77 views

METHODS TO CONTROL THE LOADING OF AN UPLINK LINE IN A MOBILE RADIO NETWORK

Severinenko A.M.

Abstract

Considered the functions for the control of cells load used on real networks of WCDMA technology, including: Potential User Control, Intelligent Access Control, Call Admission Control, Inter-Frequency Load Balancing Based on Configurable Load Threshold, Intra-frequency Load Balancing, Load Reshuffling, Overload Control. The basic parameters measured by means of a Base Station and Radio Network Controller for the cell load testing are considered. Examples are offered for the characteristics of the load. It is shown that the uplink operating load level is one of the main factors for the application of control algorithms. The issues of measurement results processing are discussed. Proposed and reviewed in detail the automatic adaptive algorithm update of background noise, ensuring its limitation in changing environmental conditions. The promising directions for further development of the proposed approach are identified.
Infokommunikacionnye tehnologii. 2017;15(1):77-84
pages 77-84 views

ELIMINATION OF DISTORTIONS WHICH OCCUR WHEN CONVERTING INTERLACED DEFLECTION INTO PROGRESSIVE ONE IN DIGITAL TELEVISION

Balobanov V.G., Balobanov A.V.

Abstract

Converting deflection in television in most cases is down to changing the parameters of the discrete sampling through time (changing the frame rate and the fields). The use of digital technology has made it possible to perform various kinds of deflection converting. The conversion of interlace deflection into progressive one is of great importance for improving the image quality. This problem is particularly acute in digital television while reducing spatial and temporal redundancies from the TV picture, but when two fields are superimposed to form a single frame, one shall have appreciable distortions of moving objects in the frame space (the effect of «comb» and «blinds» type), which, unfortunately, not always can be eliminated. The need for such a conversion is associated with an increase in the efficient removing of redundancy from TV reports. For example, when an object, the black square on a white background, moves in the vertical direction there also occurs a distortion, but of a different nature: the square is stretched vertically, turning into a rectangle, with thereof top and bottom becoming discharged in density due to a mismatch of horizontal borders (distortion of «jalousie» type). That is, there is a distortion not only of the shape of the object, but also of its content. The problem of removing the specific distortion of the «comb» and «blinds» type and an additional reduction of the digital video stream when converting interlaced deflection into progressive one remains relevant today. To solve the problems mentioned above, a comparative analysis of the gained conversion results has been conducted and the structural scheme has been developed.
Infokommunikacionnye tehnologii. 2017;15(1):85-91
pages 85-91 views

DATA SECURITY AND CONTROLLING INTERRUPTION OF THE DATA COMMUNICATION PATH IN THE SESSION MODE

Mostovoj J.A., Slepushov I.I.

Abstract

A countermeasure for information security threats with autonomous controlling physical interruption of the data communications path by a secured schedule is discussed. The method is effective within a concept of the defense in depth during functioning of many computerized systems, which have sufficient amount of episodic communications with network structural elements or service users. In this case, access of the node to the network is necessary and sufficient in the session mode in specific and limited intervals of time, between which access may be denied. The method is of independent importance, as another defensive layer, but in these conditions, it increases the effectiveness of other methods of the defense in depth, the likelihood of passing through which depends on the search time of the protected site under the possible attacks or observation. The effectiveness of the discussed method was performed. Client-server software was written on C# to implement this method.
Infokommunikacionnye tehnologii. 2017;15(1):91-97
pages 91-97 views

ELECTRODYNAMIC MODEL OF ELECTROMAGNETIC FIELDS RADIATION OF CONICAL HORN ANTENNA FOR PURPOSES OF ELECTROMAGNETIC SAFETY

Kubanov V.P., Ruzhnikov V.A., Spodobaev M.Y.

Abstract

Intensive development of the telecom industry, including radio, still leads to greater saturation of the environment with electromagnetic energy. In science, it formed a new scientific direction - the electromagnetic environment. This is an area characterized by specific problems: sanitary, environmental, social and governance. In Russia, the methodological basis of electromagnetic monitoring established over the last twenty-five years, based on the results of the decision-sponging respectively electrodynamic problems and the widespread use of computer technology. The article presents the results of research and development of the design of the field monitoring methodology, created by one of the elements of telecommunications hardware microwave - a conical horn antenna. It was solved the problem of clarifying physically reasonable mathematical model for calculating the values of the density of the energy-flow in the vicinity of the aperture of the conical horn antenna. The model focuses on the application in practice of forecasting the electromagnetic security at related facilities.
Infokommunikacionnye tehnologii. 2017;15(1):97-102
pages 97-102 views

USE OF INFORMATION TECHNOLOGIES IN TEACHING OF ECONOMIC DISCIPLINES

Shtrikov A.B.

Abstract

In this article, the analysis of use of information technologies for training students of higher educational institutions in economic disciplines is carried out. The technique, the main principles and scopes in training of students that allow increasing level of training of students that allows to save at the same time on production of printing educational and methodical benefits and to provide greater flexibility to potential changes of training programs are considered. Requirements for ensuring the training activities from the methodical and material points of view based on above-mentioned techniques and the principles of use of computer technologies are established. In addition, potential strengths and weaknesses of use of computer technologies in teaching economic disciplines in higher educational institutions are analysed. Recommendations about improvement of quality of teaching and updating of the used techniques and technologies of training, comprehensive use of the advanced information technologies and improvement of qualification of the training personnel are provided.
Infokommunikacionnye tehnologii. 2017;15(1):102-106
pages 102-106 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies