Vol 19, No 3 (2021)

Articles

SMART CITY TECHNOLOGIES: INFRASTRUCTURE OF THE FUTURE

Erokhina O.V.

Abstract

Communications make up the most important part of the city's infrastructure, and as «smart» technologies spread, transport becomes one of the areas of their most active application. The use of intelligent solutions in the development of the transport industry is aimed at reducing of the impact of the «human» factor and associated negative manifestations, reducing transaction costs for the economy, increasing manageability and optimizing traffic management, which gives a positive effect of creating a better infrastructure along with environmentally friendly and socially favorable urban environment. The article describes intelligent transport system within the context of the «smart» city concept. The main advantages and risks of introducing intelligent transport systems, the prospects for their further development, as well as examples of digital forms of interaction between the authorities and society on topical issues of urban governance were analyzed.
Infokommunikacionnye tehnologii. 2021;19(3):271-276
pages 271-276 views

INFORMATION SUPPORT FOR ACTIVITIES LOGISTICS COMPANY

Matveeva E.A., Somov K.A.

Abstract

The article contains considering the need for the development of logistics in construction, due to the fact that logistics allows to improve supply processes through the integration of logistics functions, such as: transportation and storage of materials; inventory management, both at the level of individual objects and at the level of the organization as a whole; procurement and supplier relationship management. It is shown that the main decisions in the field of supply of the construction enterprise are made with regard to the total costs. The necessity of developing an information system is demonstrated. The use of logistics systems allows you to rationally organize material flows in the construction company, which allows to manage profits by reducing the expenditures. To ensure the automation of business processes that take place in a logistics company, an information system has been developed. Such system implements the following functions: storage of purchase and sales contracts; storage of information about suppliers and buyers; storage of information about the supply and shipment of inert material; storage of data about trucks and drivers; assistance in optimizing the plan of upcoming purchases and shipments; formation of invoices and reports.
Infokommunikacionnye tehnologii. 2021;19(3):276-282
pages 276-282 views

ITERATIVE ALGORITHM FOR OFFSETS, ROTATION AND SCALE ESTIMATION FOR CONTOUR SUPERPOSITION

Diyazitdinov R.R.

Abstract

The article presents an iterative algorithm for contour superposition. The contours to be superposed are linked by a transformation that includes offsets, angle of rotation, and scale. The points of the contours to be machined do not have a one-to-one correspondence. We have developed the procedure to estimate superposition parameters. This procedure includes the offsets estimation in the Cartesian coordinate system, the rotate and scale estimation in the log-polar coordinate system. The low error in evaluation of parameters is provided by the iteration procedure. The offset rating is used for correction of the angle of rotation and scale, and vice versa. Numerical modeling was used to estimate the error of the superposition parameters depending on the noise power. The error of the developed algorithm is similar to the brute force algorithm but speed processing is faster. The algorithm can be used in real-time measuring systems.
Infokommunikacionnye tehnologii. 2021;19(3):283-292
pages 283-292 views

POSSIBILITIES OF USING FRAGMENTS OF M-SEQUENCES WITH A CHANGING INITIAL PHASE FOR CORRELATION OPTICAL REFLECTOMETERS

Arkhangelsky V.B., Glagolev S.F., Khrichkov V.A.

Abstract

In modern optical reflectometers, a periodic sequence of single pulses is used as a probe signal. The resulting reflectogram is the response of the fiber path to a single pulse and is relatively easy to interpret, making it possible to obtain information on the distribution of attenuation and the position of inhomogeneities along the fiber-optic path. To separate the backscattered signal from the noise of the photodetector, it is necessary to increase the probe pulse energy by increasing the peak power and pulse duration, as well as to carry out multiple measurements and average the values of the backscattered signal at each point of the fiber-optic path. All of the above parameters, which determine the maximum dynamic range of the OTDR, have limitations. Peak power is limited by nonlinear phenomena in the optical path, pulse duration is limited by resolution requirements, and the number of backscattered signal accumulations is limited by the maximum measurement time. The paper considers the possibility of using a combination of the M-sequence fragments for probing a fiber-optic path. The recorded backscatter signal, presented by the calculation of the cross-correlation function of this signal with the probe sequence that generates it is processed. It is proposed to use such combinations of the M-sequence fragments, the total autocorrelation function of which is ideal (has the main lobe of maximum amplitude and does not have side lobes). The proposed improvement will increase the dynamic range when creating new devices.
Infokommunikacionnye tehnologii. 2021;19(3):293-298
pages 293-298 views

SIGNAL PROCESSING IN AN OPTICAL CORRELATION REFLECTOMETER USING FRAGMENTS OF THE M-SEQUENCE FOR PROBING A FIBER-OPTIC PATH

Arkhangelsky V.B., Glagolev S.F., Khrichkov V.A.

Abstract

In an earlier work, the possibility of using a combination of M-sequence fragments with varying initial phases for probing a fiber-optic path was considered. The proposed method makes it possible to record the reflectogram of a fiber-optic path with high accuracy, but when it is implemented, the required memory volume increases significantly and the amount of computations increases significantly, due to the need to carry out correlation processing of the backscatter signal from each fragment of the M-sequence separately, and after processing it is necessary to carry out the operation of summing all the obtained autocorrelation functions. In this paper, we consider the use of a circular memory register to reduce the amount of memory occupied by the reflectometer and the number of computational operations. It is proposed to record backscatter signals from each fragment of the M-sequence into one common circular register, and then perform correlation processing of the entire data array at a time using a reference signal in the form of a complete M-sequence.
Infokommunikacionnye tehnologii. 2021;19(3):298-303
pages 298-303 views

ANALOG-TO-DIGITAL STORAGE RING WITH MEMORY RING

Arkhangelsky V.B., Glagolev S.F., Khrichkov V.A.

Abstract

This paper discusses the need for fragmentary recording of the reflectogram to increase the dynamic range of the reflectometer. To ensure high accuracy of signal digitization, it is proposed to split the communication line into several fragments, and register the backscattered signal of each fragment with different gains by changing them using scale amplifiers. This solution will allow maintaining the signal amplitude at the input of the analog-to-digital converter close to the nominal value, and thereby reduce the signal conversion errors. After digitization, the signals of each fragment are written into its own circular memory register for subsequent correlation processing. In the proposed method, to obtain a complete reflectogram, it is necessary to add the autocorrelation functions of all fragments. The presented diagrams of the reflectometer operation show the effectiveness of the proposed method.
Infokommunikacionnye tehnologii. 2021;19(3):303-309
pages 303-309 views

ABOUT PRECEDENT IDENTIFICATION OF IMAGE FRAGMENTS SCANNED MANUSCRIPT

Zhilyakov E.G., Zalivin A.N., Belov S.P., Chernomorets D.A., Vasilyeva N.V.

Abstract

At present, large repositories of data obtained by scanning handwritten texts have been accumulated. A significant part of them are presented by scanned printed documents, which contain handwritten signatures of officials. The images of texts obtained in the process of scanning are often subjected to computer analysis in connection with one or another need. Search for fragments of these images, containing preset word forms, for example, in philology when studying the frequency of use of certain words by the same author is of significant interest. You can also indicate cases of word search from the standpoint of ensuring the safety of socio-economic processes. An important example is the detection of falsification of signatures of officials, etc. A feature of the automatic search for identical word fragments in images of scanned documents is the ability to identify them using only one text sample (precedent), which requires the creation of a special machine learning technique. In the presented article a decisive procedure for classifying word fragments of images of scanned handwritten text as identical to a given precedent has been developed. It was proposed to use the projection of vectors onto the eigenvectors of subband matrices corresponding to nonzero eigenvalues as elements of the feature space. A method for the formation of total subband matrices is substantiated on the basis of the introduced concept of information subbands in the area of spatial frequencies. A training procedure based on one precedent is proposed. This procedure is based on the developed method for generating vectors, the totality of which simulates the training sample. An algorithm for processing images when searching for identical to a given fragment was formed.
Infokommunikacionnye tehnologii. 2021;19(3):309-316
pages 309-316 views

THE AVERAGE MAXIMUM VALUES OF QUEUES IN MASS SERVICE SYSTEMS WITH GROUP POISSON FLOWS

Likhttsinder B.Y.

Abstract

As a model of telecommunication traffic, it is proposed to use a group non-ordinary Poisson flow. The interval characteristics of these flows are considered and the prospects of their application are shown. The concept of average maximum values of queues is introduced. Ratios establishing the dependence of the average maximum values of queues on the load and characteristics of group Poisson flows are obtained. It is shown that at low loads, the average maximum values of the queues significantly exceed their average values. The prospects of using the obtained ratios in the analysis of packet traffic of telecommunication networks are shown.
Infokommunikacionnye tehnologii. 2021;19(3):316-319
pages 316-319 views

COMPARISON OF THE EFFECT OF ENCRYPTION AND HASHING ALGORITHMS ON DATA TRANSFER RATE OF CLIENT-TO-SITE AND SITE-TO-SITE VPN CONNECTIONS UNDER LOAD

Vasin N.N., Alennikov E.M., Subbotskaya A.Y.

Abstract

Virtual private network (VPN) technology is currently the mainstay for the exchange of confidential information through Internet. The technologies used to protect traffic of such networks consume router resources and affect the processing speed. Use of routers to encrypt and decrypt data can affect the transfer rate of this data over such network, especially if such network carries not only VPN traffic, but also traffic of ordinary Internet users. This paper compares the impact of encryption and hashing algorithms on the process of transferring packets over two types of VPN connections: Client- to-Site and Site-to-Site connections. A study of the influence of encryption and hashing algorithms on the speed and performance of two VPN-connection technologies when loading a communication channel was carried out. This experiment was carried out on computer and physical models. The computer model of the network was created in the GNS3 network emulator, the physical model was assembled using the next generation routers with integrated services Cisco RV 340. The research results are presented in the form of graphs and diagrams.
Infokommunikacionnye tehnologii. 2021;19(3):320-327
pages 320-327 views

A METHOD FOR ASSESSING THE RESOURCE INTENSITY OF CHANGING THE REQUIREMENTS OF THE PURPOSE WHEN THE DESCRIPTION OF RECONFIGURABLE INFOCOMMUNICATION SYSTEMS IS INCOMPLETE

Loginov I.V.

Abstract

The increase in the structural and functional complexity of infocommunication systems as a result of scientific and technological progress has led to the formation of multifunctional systems. Under contemporary conditions such systems are characterized by the dynamics of requirements and reconfiguration for these changes. Continuous reconfiguration requires the necessary resources in the planning process to perform the assessments. The aim of the article is to develop an approach to assessing the resource intensity of implementing changes in the requirements of the assignment with incomplete description of the reconfigurable infocommunication system. The main idea of the work is to form estimates of the resource intensity of reconfiguration based on the values of the coefficient of change in requirements. The assessment is performed on the basis of available data on the performance of particular indicators of the requirement system - existing functional components with known resource intensity values. At the same time, correction factors depending on the type of change in requirements and the type of resource, which are specified in the process of changing the multifunctional system according to the criterion of the minimum estimation error, are introduced. The practical significance of the work is to develop a methodology for approximate estimation of resource intensity based on a fuzzy approach in order to take into account the uncertainty of the initial data describing the infocommunication system.
Infokommunikacionnye tehnologii. 2021;19(3):327-335
pages 327-335 views

SYNTHESIS OF THE MATRIX OF TRANSITIONAL PROBABILITIES OF THE FINAL MARKOV CHAIN DESCRIBING PROCESS OF INFORMATION EXCHANGE IN THE POINT-TO-POINT CONNECTION OF METHOD OF FICTITIOUS STATES

Toiskin V.E., Moskvin A.A.

Abstract

A feature of the information exchange process in data transmission networks in a complex interference environment is its randomness. Traditionally, such processes are modeled on the basis of the apparatus of the theory of finite Markov chains. At the same time, the classical approach to determining the characteristics of the message delivery process does not allow taking into account real time. This disadvantage is eliminated using the dummy state method. In this paper, on the basis of a system analysis, we have revealed the regularities of constructing a matrix of transition probabilities of an absorbing finite Markov chain using the dummy state method when simulating the process of delivering message packets through data transmission networks with a point-to-point connection. Construction regularities made it possible to formulate the rules for the automated synthesis of this matrix. The use of the proposed rules for finding the probabilistic-temporal characteristics of information exchange between network nodes is considered.
Infokommunikacionnye tehnologii. 2021;19(3):336-345
pages 336-345 views

ISSUES OF USE SPATIAL POLARIZATION DIVERSITY IN THE DATA TRANSMISSION SYSTEM IF THE COMBINED HF RADIO CENTER

Baraboshin A.Y., Luchin D.V.

Abstract

The article examines the issues of using polarization diversity to ensure an increase in the data transfer rate by a spaced radio center of decameter range. An algorithm for polarization spatial coding and a method for the simultaneous formation of waves with left and right circular polarizations are proposed. An algorithm for obtaining estimates of the channel matrix is considered. The results of mathematical modeling, showing the efficiency of the proposed algorithms, are presented.
Infokommunikacionnye tehnologii. 2021;19(3):345-356
pages 345-356 views

DEVELOPMENT AND INTEGRATION OF ADAPTIVE SCL DECODER INTO HARDWARE FPGA PLATFORM XILINX ARTIX-7 XC7A100T

Chilikhin N.Y., Karpukhina E.K., Goryunov A.O.

Abstract

The process of adaptation (adjustment) to external influences is the driving force of the development of any natural (biological) and technical (anthropogenic) system. An attempt to develop and subsequently implement such a system turns out to be, in fact, a search for a scheme that takes into account all or the most probable operation modes. However, in reality, the designer of such devices solves the problem of minimizing the cases of system blocking. In the course of work, a team of authors made a fairly successful attempt to create an adaptive decoder on the basis of a programmable logic integrated circuit. By adaptation, the authors mean the search for the optimal scheme according to the following criteria: correction and bandwidth, delay. As a proposed solution, a device configuration has been created that includes: Arikana serial decoder, Tala-Vardi and cyclic redundancy code decoder. FPGA Xilinx Artix-7 is used as a platform. Some of the most important benefits of Xilinx’s Artix-7 platform include 50 % less power consumption compared to competitors, support for DDR3 at 1066 Mbps, shipping with an annual license, and use of the 28nm process technology. The results obtained make it possible to assert that the created adaptive decoder based on polar codes is expedient to use in control channels (critical to delays and functioning in the absence of local stationarity) of high-speed and mobile communication systems.
Infokommunikacionnye tehnologii. 2021;19(3):357-365
pages 357-365 views

MODERN ACHIEVEMENTS INTO CRYPTO-BIOMETRIC PROTECTION OF INFORMATION BASED ON HANDWRITING

Bayanov B.I.

Abstract

The article presents the results of scientific achievements in the field of biometric-cryptographic security of information. A modern area in the development of biometric information security is the solution of the task of formation a cryptographic key based on the biometric features of the user. A comparative analysis of Biometrics-access code converters: fuzzy extractors and neural network Biometrics-code converters, was carried out. Biometric data of handwriting, keystroke dynamics, voice features and biometric data of the face are considered. The classification of biometric security of information tasks, the table of advantages and disadvantages, the table of the results of average estimates of the quality of algorithms for formation a cryptographic key based on the user’s biometric features are presented. The presented results can be useful for specialists in the field of biometric information security when choosing promising scientific research.
Infokommunikacionnye tehnologii. 2021;19(3):365-374
pages 365-374 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies