Vol 18, No 1 (2020)


Sub-band Representation Image Analysis in the Field of Spatial Frequencies

Zalivin A.N., Chernomorets A.A., Zhilyakov E.G., Belov S.P.


Currently, two-dimensional visual representations of various information arrays are widespread, since images are the most natural form of information exchange for humans. Therefore, various information technologies for the implementation of computer image processing have been created. A signifcant place among existing information technologies is occupied by computer image analysis, the basis of which is the procedure for determining certain properties that characterize them from certain positions. In particular, an important area of image analysis is the automatic classifcation of their constituent objects (pattern recognition). The main attention is paid to the choice of the so-called feature space, which from the standpoint of the problem being solved most adequately refects the properties of the analyzed images. The article considers the possibility of using a sub-band method for image analysis, the application of which, as shown by the research results, allows to obtain characteristics that can be used as features for their comparison.
Infokommunikacionnye tehnologii. 2020;18(1):7-12
pages 7-12 views

Estimate Jitter in the G/M/1 System Based on Hypreexponential Distributions

Buranova M.A., Kartashevskiy V.G., Latypov R.T.


Analysis of the parameters of the functioning of IP-networks in the processing of multimedia streams is a very important task. There are many approaches to assessing the quality of service parameters in the G/G/1 system. But such an analysis is often based on assumptions that do not allow determining the parameters with the necessary accuracy. The paper considers an approach to assess the average value of jitter of multimedia trafc recorded on a real network. The analysis of jitter of multimedia trafc in the G/M/1 system is given. Jitter estimation is based on the G/G/1 system approximation by the system, which has a hyperexponentially distributed arrival and servicing time. To determine the hyperexponential distribution parameters, well-known approaches based on the assessment of the initial moments of the frst and second order have been used.
Infokommunikacionnye tehnologii. 2020;18(1):13-20
pages 13-20 views

Remote Power Supply of Optical Networks, Network Communication Elements and Other Electrical Equipment of JSCo «RZD» on POF Technology

Belonogov A.S., Shorokhov N.S.


The article describes the method and system of high power laser transmission over fiber optic for power supply of electronic devices of railway automatics, telemechanics and communications, optical networks and nodes based on Power-over-Fiber technology using special fiber optic cable and high power laser system. Use of these cables enables transmission of high power laser radiation energy over long distances, and these distances and power transmission levels were previously considered unattainable. This was achieved due to the special multi-layer structure of the cable used, as well as the absence of the frequency spectrum in the spectral characteristics of laser radiation, where the phenomena of forced Raman scattering occur. The results of the experiment are presented, which showed the possibility of transmitting a peak input laser power of 5 kW at a distance of 2 km, having received 51 % of the initial power at the system output. In addition, the cable design is expected to withstand severe atmospheric conditions.
Infokommunikacionnye tehnologii. 2020;18(1):20-27
pages 20-27 views

Research of System with Shifted Hyper-Erlang and Exponential Input Distributions

Tarasov V.N.


This article presents the results of studies on the HE2/M/1 queuing system with hyper-Erlang and exponential input distributions shifted to the right from the zero point. By Kendall’s definition, the HE2/M/1 system with conventional distributions is of type G/M/1, for which, in general the solution for the average queue waiting time is not known. The same system with shifted distributions is transformed into the G/G/1 system, for which, in the general case, the solution for the average waiting time is also unknown. Considering the fact that, starting with a coefficient of variation equal to four, the distribution of hyper-Erlang has a heavy tail, the system in question can have an active application in the modern theory of teletraffic. Using higher-order hyper-Erlang distributions is difficult to derive a solution for the average waiting time of requests in a queue due to increasing computational complexity. For the hyper-Erlangian distribution law, as well as the hyperexponential law, the spectral decomposition method for solving the Lindley integral equation makes it possible to obtain a final solution. The article presents the results on the spectral decomposition of the solution of the Lindley integral equation for the queuing system HE2/M/1 with shifted distributions, as well as the calculation formula for the average waiting time for claims in the queue. It is shown that the HE2/M/1 system with shifted distributions is a system with a time lag and provides a shorter waiting time compared to a conventional system. The adequacy of the results is confirmed by the correct use of the classical method of spectral decomposition and the results of numerical simulation. To derive the obtained results, as well as for numerical calculations, the well-known method of moments of probability theory is used.
Infokommunikacionnye tehnologii. 2020;18(1):27-33
pages 27-33 views

Research of Two Queuing Systems M/E2/1 with Ordinary and Shifted Input Distributions

Tarasov V.N., Bakhareva N.F., Akhmetshina E.G.


Teletraffic theory often uses queuing systems like M/G/1 and G/G/1. Studies of the latter are still relevant due to the fact that it is impossible to obtain solutions for the average waiting time in the queue in the final form in the general case. This article presents the results for two queuing systems: for a regular M/E2/1 system with exponential and Erlangian distributions, as well as this system with distributions shifted to the right from the zero point. The operation of shifting the laws of distributions in this case transforms the M/G/1 system into a G/G/1 type system due to a decrease in the coefficient of variation of the intervals of the input flow into the system. As it turned out, for the distribution laws under consideration, the spectral decomposition method used for solving the Lindley integral equation for G/G/1 systems allows us to obtain a solution for the average waiting time in the final form. It is shown that in such a system with a delay in time, the average waiting time for requests in the queue can be many times shorter than in a similar conventional system. This follows from the fact that the time-shift operation of the distribution laws reduces the coefficient of variation of the intervals between arrivals and service time. At the same time, it is known that the average waiting time for requirements in the queue for the system depends directly on the squares of these variation coefficients. The M/E2/1 system is applicable only when the coefficient of variation of the intervals of arrival equal to 1 and the coefficient of variation of the service time is equal to 1/ 2, and the system with delay is applicable when the coefficients of variation of the intervals of arrival in the range (0, 1) and the coefficients of variation of the time of service from the interval (0, 1/ 2), which dramatically expands the scope of these systems. To derive solutions by the average waiting time in the queue, the spectral decomposition method of solving the Lindley integral equation, known in queuing theory, was used.
Infokommunikacionnye tehnologii. 2020;18(1):33-39
pages 33-39 views

Simulation of Teletrafc Based on E2/HE2/1 System

Tarasov V.N., Bakhareva N.F., Kada O.


This article presents the results of deriving the formula for the average waiting time for the queuing system E2/HE2/1 with second-order Erlang and hyper-Erlang input distributions. By the definition of Kendall, this system belongs to the class G/G/1 with arbitrary laws of distribution of intervals of the input stream and service time. In queuing theory, studies of such systems are particularly relevant because it is impossible to find a solution for the average waiting time in the queue in the final form for the general case. For the system under consideration, such a solution can be obtained in closed form based on the classical method of spectral decomposition of the solution of the Lindley integral equation for systems of type G/G/1. Using higher-order Erlang and hyper-Erlang distributions is difficult to derive a solution for the average latency due to increasing computational complexity. The article presents the obtained spectral decomposition of the solution of the Lindley integral equation for the system under consideration and the calculation formula for the average waiting time in the queue. The adequacy of the results is confirmed by the correct use of the classical method of spectral decomposition and the results of numerical simulation. The E2/HE2/1 system is applicable when the coefficient of variation of the intervals of receipt is equal to 1/ 2 and the coefficient of variation of the service time is greater 1/ 2. For practical application of the results obtained, the probability method moments method is used. The results of numerical modeling in the Mathcad package unambiguously confirm the fact of the queuing theory that the average waiting time is related to the coefficients of variation of the intervals of arrival and service time by a quadratic dependence
Infokommunikacionnye tehnologii. 2020;18(1):39-45
pages 39-45 views

An Adaptive Model for Detecting the Vulnerabilities of Unmanned Vehicles Interface in Smart City Infrastructure

Skatkov A.V., Bryukhovetskiy A.A., Moiseev D.V., Shevchenko V.I.


A method of detection vulnerabilities in unmanned vehicle interfaces based on an analysis of a traffic condition in communication channels of unmanned transport systems is proposed. The approach is based on non-parametric statistics methods for assessing the information states of controlled objects, which include such unmanned vehicles resources as: communication channel, processor, memory, power supply, etc. For each of these resources, it is proposed to evaluate the change in such characteristics as the degree of load resource and its rate of change. Recognition of the state of network traffic is carried out in conditions of a lack of a priori information about the properties of the intrusion source and the stochastic nature of the recognized events. To increase the reliability level of vulnerability detection in the model, adaptive dynamic tuning of decision-making rules for classifying the information state of the traffic of unmanned vehicles is carried out.
Infokommunikacionnye tehnologii. 2020;18(1):45-50
pages 45-50 views

Inculcation of Eco-Management in Hotel Service

Abramov V.E., Sakharova A.L.


The article is devoted to environmental issues, through the introduction of eco-management in the provision of hotel services. Possible threats to environmental security and measures of its preservation and protection are considered. Recommendations on the prevention of harmful human impact on the environment for hotels and resorts in the world practice are formulated. The general and private characteristics of the stated problems, as well as the supposed means of their solution are given. The information presented is based on documented materials from the world practice of using various methods and means involved in solving the indicated problems of the world community. The sources of information are authentic, which attracts attention not only of experts, but also ordinary users of hotel services, as well as all the inhabitants of planet Earth - the place where we all live today
Infokommunikacionnye tehnologii. 2020;18(1):51-56
pages 51-56 views

Two-Component Steanographic System Based on Ratio of Linear Functions of Two Signals Using an Additive Type of Embedded Signal Communication

Shakurskiy M.V.


The implementation of a two-component container can significantly expand the capabilities of known steganographic methods due to occurrence of new properties. A two-component container consists of two functions of two variables, one of which is a hidden signal and the other is a container signal. The article considers the functions of component formation based on the ratio of the linear functions of two signals. The expressions for forming the components and the expression for restoring the hid-den signal are ratios and have break points. It requires analysis and determination of the conditions for the formation of the container. The article presents the results of the analysis of a two-component steganographic system with a non-linear container in the area of the break of the restore function of the informative signal. Key coefficients are determined from the point of view of ensuring the greatest sensitivity of the system to the error introduced in the value of the coefficient. An analysis is made of the influence of the error added into the key coefficient on the shape of the recovered signal.
Infokommunikacionnye tehnologii. 2020;18(1):56-61
pages 56-61 views

Enterprise Data Processing Networks: Authentication and Identifcation Procedures

Vasilenko K.A., Zolkin A.L., Abramov N.V., Kurganov D.O.


This article is dedicated to the problem of personal data and information protection from intruders, as well as to methods of authentication and identification in the enterprise data processing networks. Different methods of authentication and identification in data processing networks are given in the article. The authors have conducted the comparative analysis of these methods, have highlighted the features and weaknesses of these methods in different fields of application. In addition to the above the authors have conducted the risks analysis and analyzed the possible losses in case of confidentiality compromise. Every year, the amount of violations in data confidentiality, availability and integrity is growing as well as the amount of caused losses. These facts make cyber security specialists conduct more careful and deep analyses of all risks of unauthorized access to the information and then to introduce modern authentication means, use new coding methods and increase the frequency of generation of the new system access passwords. Today, there are many authentication means and methods, but the specifics of their application depend on the location of the information storage and its value. Meanwhile, the authentication methods are not flawless methods of protection, they are also vulnerable and success of their hack depends on the skills of the intruders.
Infokommunikacionnye tehnologii. 2020;18(1):61-67
pages 61-67 views

On Artifcial Versus Human Intelligence Proportion in Digital Economy Applications

Ivaschenko A.V., Diyazitdinova A.R., Krivosheev A.V., Nikiforova T.V.


In this article the problem of finding the optimal balance in the distribution of functions in a modern enterprise between personnel and the intelligent software components of the systems for decision-making support is considered. The new model of interaction between software agents and decision makers, which is designed to determine the balance between several agents and performers, in order to develop the most effective strategies for the professional development of enterprise employees is proposed. Recommendations are given on optimizing the proportion of natural and artificial intelligence in applied problems, taking into account the influence of the human factor in the context of the active introduction of intelligent technologies under the context of digital economy development. The proposed solution is illustrated by the example of organizing the collection and processing of electricity meter data in a distributed organizational and technical system that implements the functions performed by operators using mobile communication devices and intelligent software based on an artificial neural network.
Infokommunikacionnye tehnologii. 2020;18(1):68-76
pages 68-76 views

The Kernel-Cluster Model of «Digital University Platform» and Aspects of its Practical Implementation

Antipova T.A., Kudryashov A.A., Mishin D.V., Osipov O.V.


The work is devoted to the description of the principles of creating a global digital platform for the management of the activities of higher education institution «Digital University» The basic principles of creating such a platform are considered, the main processes that are subject to digital transformation are identified. The work outlines the general issues of user interaction within the digital platform, describes the option of managing the platform as a whole using the platform core, neural network technologies and artificial intelligence. The possibility of creating individual educational trajectories for students is considered. A general model of the «Digital University» platform is proposed, as well as the possibility of an intelligent electronic recruitment of applicants. The basic principles of building models of digital platforms regardless of their field of application are described in the paper. The functionality of the digital platform in relation to the educational activities of the university is described in detail. The process of intellectual enrollment is considered on the basis of the analysis of their digital portfolios, as well as open data from social networks.
Infokommunikacionnye tehnologii. 2020;18(1):76-89
pages 76-89 views

Leonard Jimmy Savage and his Subjective Probability Theory. Part I. Scientifc Background, Preconditions and Prospects

Abramov V.E., Maslov O.N., Shatalov I.S., Yuklasov K.A.


This paper is the first in a series of publications which aims to familiarize infocommunication technology specialists with the legacy of one of the founders of the subjective theory of probability - Leonard Jimmy Savage. It is noted that the content of the fundamental work «Fundamentals of Statistics» brings the modern reader far beyond the title of this book, as it is directly related to subjective theories of risk and expected utility. It is shown that Bernoulli-Savage’s probability theory corresponds to a subclass of complex systems that are commonly referred to as non-reflective quasi-real systems. This class also encompasses a wide range of socioeconomic, ecological, industrial, military and other hierarchical systems, all of which also incorporate, to varying extent, the factor of human reliability and decision-making. The first paper of the series details the scientific background and historical preconditions of the Bernoulli-Savage theory of probability, as well as its prospective outlooks and practical applications.
Infokommunikacionnye tehnologii. 2020;18(1):89-105
pages 89-105 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies