Vol 8, No 1 (2010)

Articles

SIM METHOD APPLICATION OPPORTUNITIES FOR INTERNAL STA DECISION MAKING

Maslov O.N.

Abstract

In the introduced observation application opportunities of statistic theory of antennas (STA) of computer statistic imitation modeling method (SIM) are examined for internal decision making. STA objects are described as steps of SIM method; basic data are introduced as well as probable criteria to estimate final results of SIM. «Black box» method defines targets and goals of modeling. SIM-complex non-reflective systems development specifics are mentioned. Distribution laws of amplitude, phase, geometric, frequency and time errors are recommended to introduce and investigate, applying SIM-method and limited theorems (LT) of probability theory (PT). SIM-methods of application and testing are described, which are structured on the base of one measured stable family laws of LT PT. Test sequences are realized with Monte-Carlo method of random numbers (RN), following the one measured stable laws. Structural principles of static and dynamics SIM-models for STA objects are described, and also their adequacy and reliability are introduced.
Infokommunikacionnye tehnologii. 2010;8(1):8-22
pages 8-22 views

NEW METHOD AND ALGORITHM OF PERFORMANCE OF BASE OPERATIONS IN THE ELLIPTIC CURVES USED IN SYSTEMS OF CRYPTOGRAPHIC PROTECTIONOF THE INFORMATION

Chervaykov N.I., Golovko A.N., Kondrashov A.V.

Abstract

In article the new method and algorithm of performance of base operations in elliptic curves with use of the modified system the Jacobian coordinates and advanced binary algorithm of scalar multiplication of points is considered. The offered approach with use of elliptic curves allows to provide higher speed of enciphering of the information in comparison with known approaches
Infokommunikacionnye tehnologii. 2010;8(1):23-28
pages 23-28 views

MATHEMATICAL MODELS FOR DISTRIBUTED STORAGE AND PROCESSING OF HIGH-DIMENSIONAL DATAWITH A HIGH DEGREE OF FAULT-TOLERANCE

Mezentseva O.S., Alekseev A.I.

Abstract

The paper presents mathematical models for distributed storage and processing of high-dimensional data. The models presented are based on the threshold schemes and provide a high degree of fault-tolerance. Presented parallel algorithms use modular arithmetic to reach noticeable speed-up as compared to equivalent serial schemes, what makes the proposed algorithms suitable for large-scale real-time systems. Implementation possibilities are also discussed with the focus on NM6403 neuroprocessor
Infokommunikacionnye tehnologii. 2010;8(1):28-35
pages 28-35 views

PROCESSING OF SIGNALS ON THE BASIS OF MODEL IN THE FORM OF GENERALIZED NONLINEAR SHROEDINGEREQUATION

Grigorov I.V.

Abstract

The way of realisation of the nonlinear phase filters constructed on the basis of model in the form of the generalized of nonlinear Shroedinger equation in which it is considered dispersive effects of the higher usages is considered
Infokommunikacionnye tehnologii. 2010;8(1):35-38
pages 35-38 views

INTERACTION OF ELECTROMAGNETIC RADIATION WITH NON-UNIFORM LAYER MAGNITODIELECTRIC

Panin D.N.

Abstract

The technique of numerical modeling of interaction of electromagnetic radiation with a non-uniform layer magneto-dielectric is offered. The differential equation for factor of reflection of a wave from the truncated layer is received.
Infokommunikacionnye tehnologii. 2010;8(1):38-42
pages 38-42 views

SOME FEATURES OF USE OF TELEVISION SIGNALS AS A SOUNDING SIGNAL OF BISTATIC SAR

Goryachkin O.V., Yangazov R.R.

Abstract

In this paper present the television broadcasting signals analysis for using in bistatic synthetic aperture radar (SAR). One of possible variants of creation this SAR is presented. As a sounding signal the television signal of standard SECAM was used. The estimation of influence of the informative contents, transferred television programs, on the basic parameters of quality of system is made. Two dimensional representations of ambiguity function from coordinates are constructed.
Infokommunikacionnye tehnologii. 2010;8(1):42-46
pages 42-46 views

THE RELATIVE ANALYSES OF DIFFERENT TYPES OF WAVALET-TRANSFORMATION FOR COMPRESSION SATELLITE IMAGES

Sultanov A.K., Bagmanov V.K., Meshkov I.K., Kharitonov S.V.

Abstract

The methods of assessment and finding index of fractal self-similarity are considered in the article, and the relative analyses of different types of wavelet-transformation of quasi-continuous scan for compression satellite images are proposed. The results of calculating experiments show the possibility of using different types of wavelet-transformation for solution formulated task
Infokommunikacionnye tehnologii. 2010;8(1):46-51
pages 46-51 views

QUANTITATIVE ESTIMATION OF THE LOSSES TO INFORMATION AND NATURE OF THE BUILDING OF THE QUEUES IN PACKET SET

Linec G.I., Samus M.V., Skorobogatov S.A., Fomin L.A.

Abstract

Mathematical correlations are received on base of the theories surge casual processes for quantitative estimation of the losses to information, which are used at determination of network capacity and nature of the building of the queues in packet set
Infokommunikacionnye tehnologii. 2010;8(1):51-55
pages 51-55 views

ALGORITM OF DETERMINATION OF CORRECTING ABILITY OF THE BLOCK CODES CONSTRUCTED OF THE CONVOLUTION CODE

Malofey O.P., Manaenko S.S., Mishin D.V., Potyagov D.A.

Abstract

The algorithm of determination of correcting ability of the block codes constructed on the basis of the convolution coder is developed, at use of a way of the syndromes decoding, considering possibility of correction of errors of bigger frequency rate at the expense of determination of syndromes of corrected and found out errors and representation of correcting ability in the form of non-integral number.
Infokommunikacionnye tehnologii. 2010;8(1):55-58
pages 55-58 views

OPTICAL LINK UPGRADE WITH COMPENSATING FIBER IN OPTICAL CABLE CLOSURE

Volkov K.A.

Abstract

In this paper we dense dispersion management solium (DDMS) technique installation of optical cables closure with dispersion compensating fibers are present. The possibility application DDMS technique was acknowledgment numerical simulation
Infokommunikacionnye tehnologii. 2010;8(1):58-61
pages 58-61 views

RESEARCH OF PRESSURE IN THE PROTECTED PLASTIC DUCT WITH FREEZING WATER

Nikulina T.G.

Abstract

Results of experimental researches of pressure in the protected plastic duct applied on cable communication lines, created are presented at water freezing in the duct. The experiment technique is described. Estimations of pressure the duct are presented.
Infokommunikacionnye tehnologii. 2010;8(1):62-65
pages 62-65 views

DEVELOPMENT AND STUDY OF THE CONTROLLER TO PATHWAYS VME

Khvorenkov V.V., Yuminov O.B., Pivovarov V.V.

Abstract

In this article a variant of realization of coupling controller of signal processor ADSP-21364 on the base of PLIC with the pathways VWE is considered. The controller is realized on the base of PLIS Cyclone II family Altera - EP2C5Q208I8. Limited velocities of data exchange at maximum reliability at different operating condition are determined
Infokommunikacionnye tehnologii. 2010;8(1):65-70
pages 65-70 views

THE MULTIALPHABETIC ADAPTIVE CODE, BASED ON INTEGRATED TRANSFORMATIONS

Alekseev A.P., Blatov I.A., Makarov M.I., Pohlebaev B.A.

Abstract

Positive feature of the multi-alphabetic adaptive code is uniform distribution of elements of the cryptogram. For achievement of it during enciphering build the histogram on which define a place of a failure. One of two values of the certain integral necessarily takes from a place of a failure, thus leveling target distribution. On the reception side send values of the top and bottom limits of integration which are elements of the cryptogram
Infokommunikacionnye tehnologii. 2010;8(1):70-75
pages 70-75 views

THE FORMAL PRESENTATION STRUCTURE OF THE ENGINEERING PROCESS IN FUNCTIONALLY ADAPTED CAD

Gorbachev I.V., Pokhil'ko A.F.

Abstract

This paper describes the principles of operation and functionally adapted CAD structure. Also it lists the formal presentation structure of informational space objects of functionally adapted CAD, and principles of branch formation.
Infokommunikacionnye tehnologii. 2010;8(1):75-78
pages 75-78 views

THE METHOD OF ASSESSING THE QUALITY OF COMMUNICATION SERVICES OFFERED BY PROVIDERS FIXED

Akchurin A.A., Rodionov S.V.

Abstract

This article focuses on methods for assessing and determining the optimal target availability of client service providers, as well as the reliability of its transport network as a whole, taking into account the requirements for this service. The above method can be used as a service provider, its partners and customers for mutual control of SLA.
Infokommunikacionnye tehnologii. 2010;8(1):79-82
pages 79-82 views

DIRECTING THE DOCUMENTARY

Matveeva O.R., Balobanov V.G.

Abstract

The features of documentary as type of cinematography are described in the article. Also the algorithm of this creation are described. Technical and program means necessary for creation of documentary and for other types of TV production are provided.
Infokommunikacionnye tehnologii. 2010;8(1):82-85
pages 82-85 views

THE INTEGRATED ASSESMENT OF SAFETY ON THE BASIS OF THE EXPERT JUDGEMENTS

Azhmukhamedov I.M.

Abstract

The method of evaluating the complex safety of computer systems and networks on the basis of expert judgments is proposed. The index of the level of complex safety is built on the base of aggregation of values from all levels of the hierarchy of factors on the basis of qualitative data about the levels of factors and their relations of order on the same level of hierarchy.
Infokommunikacionnye tehnologii. 2010;8(1):86-90
pages 86-90 views

ANALYSIS OF NETWORK CLUSTER ARCHITECTURES

Urivsky A.V., Chefranova A.O.

Abstract

The paper deals with architectures of network clusters used in information processing and protection while transmitted through communication networks. We give a theoretical model of computation. The solution of network tasks is assumed to be linearly dependent on their size or the size of computation results. Next we consider several cluster architectures, which give the logic of cluster hosts interaction. We restrict our attention to architectures that can be implemented by widespread non-expensive off-the-shelf components. The architectures are evaluated and compared to each other by criteria of performance, availability and requirements to intra-cluster networks capacity.
Infokommunikacionnye tehnologii. 2010;8(1):90-94
pages 90-94 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies