Vol 11, No 1 (2013)
- Year: 2013
- Articles: 19
- URL: https://journals.eco-vector.com/2073-3909/issue/view/3246
Articles
NUMERICAL METHOD OF THE THRESHOLD SECRET SHARING OVER A GROUP OF THE ELLIPTIC CURVE
Abstract
This paper presents a method of secret sharing based on imperfect threshold circuit Mignotte and key distribution scheme Massey-Omura. Threshold and elliptical cryptography has the advantage of parallel processing part of the secret, renewal, verification, change the number of users and the entropy of the secrets than the existing counterparts. The proposed scheme can be used to build secure systems, transmission, storage, processing and presentation of data in computer networks.
Infokommunikacionnye tehnologii. 2013;11(1):4-11
4-11
12-18
18-21
THE TASK OF FIBER-OPTICAL SEGMENT FOR HIGHT BIT RATE NETWORKING
Abstract
The article is devoted to research of a method, ensuring a soliton mode of link with use of fiber-optical components, carrying out positive chirping in information pulses. The analysis of existing methods based on use of an information signal chirping for indemnification chromatic dispersion by optical means was carried out. The modeling of an optical pulse duration and its chirp functions on an offered segment has allowed to estimate parameters of a segment -distance between restoring pits and level of an additional radiation capacity. Method is interesting for height bit rate (40 GBit/s or more) and do not use electrical or local technique for dispersion compensate.
Infokommunikacionnye tehnologii. 2013;11(1):22-29
22-29
TELEPHONY ON P2P NETWORKS
Abstract
In article alternative techniques of designing of the communication networks, constructed on the basis of P2P networks are offered. In particular, the case of creation of a network of telecommunication and a network of date transmission on the basis of package switching and technology Bluetooth is considered.
Infokommunikacionnye tehnologii. 2013;11(1):30-32
30-32
CREATION OF FUNCTIONS OF DISTRIBUTION OF THE REAL TRAFFIC BY MEANS OF THE CUMULANT ANALYSIS
Abstract
This article discusses the use of cumulant analysis to approximate the density functions in the chain of multi-service network. And can be displayed via the cumulants can obtain the density distribution at the output processing unit.
Infokommunikacionnye tehnologii. 2013;11(1):33-36
33-36
37-41
OPTIMAL INFORMATION-GRAPH MODEL ORGANIZATION INCLUSIVE SEARCH IN DESCRIPTOR SEARCH ENGINES
Abstract
This article describes how to create an optimal information-graph model of the organization of inclusive search in descriptor search engine to provide continuous backup information. The evaluation of inclusive search considered optimal information and graphs with nedrevovidnoy tree structure. A detailed algorithm for solving the problem of inclusive search by building information graph.
Infokommunikacionnye tehnologii. 2013;11(1):41-48
41-48
A PROTOTYPE OF UNIVERSAL SOFTWARE TOOL FOR BUILDING MACHINE COMMENT AS A CLASS DIAGRAM SOURCE CODE
Abstract
This article describes using of source code intermediate representations for static analysis. It is proposed to extend using of generic and multi-level representations in one common. Software tool prototype that can make and process this kind of representation introduced.
Infokommunikacionnye tehnologii. 2013;11(1):48-52
48-52
PERCOLATION CONTROLED IN LARGE-SCALE NETWORK
Abstract
The approach is considered to study of the large-scale (complex) networks, connected with model percolation upon their rib information, transport etc. traffic. They are considered appearing herewith clusters of object and statistical phenomenon’s, connected with them. Alongside with threshold stochastic percolation is researched point to maximum clusterization, in which number formed clusters is maximum. It Is entered notion percolation controlled of the zone of the service, which is realized in two phases: stochastic base on the first with comparatively small concentration object, not providing stochastic percolation but on the second in inter-cluster intervals are entered additional objects to achieve the most short percolation way through stochastic base under relatively low gross amount object and minimization of the general expenses. The results are received by way of statistical modeling of the greater networks on square matrix. The got results are used for analysis greater information, computing and social net-works, as well as for calculus of the safe ways in disadvantage casual ambience.
Infokommunikacionnye tehnologii. 2013;11(1):53-62
53-62
BUSINESS PROCESS SIMULATION DYNAMICS
Abstract
Article is devoted to the description of simulating models development process for very difficult economic processes in interests of management efficiency increase. Creation of model is considered on example of simple business process, which is typified . This article is directed on improvement of understanding often very difficult process of simulating model creation in social and economic fields.
Infokommunikacionnye tehnologii. 2013;11(1):63-78
63-78
MATHEMATICAL INTERPRETATION OF THE TASKS OF IMPROVING THE MANAGEMENT OF SOCIAL AND ECONOMIC PROCESSES OF MODERN TELECOMMUNICATIONS COMPANY
Abstract
Problems of social and economic processes management in modern telecommunication company are studied in this work. The study substantially is in the framework of provision of Internet services to corporate and individual customers. The attention drawn to the main challenges to be addressed in the framework of this research: identification of the most effective social and economic processes structure and its control algorithms.
Infokommunikacionnye tehnologii. 2013;11(1):79-84
79-84
DEFINITION AND ANALYSIS OF INDICATORS OF EFFICIENCY AT REALIZATION OF THE ELECTRONIC REGION
Abstract
In article the efficiency indicators are defined on the level of consumers of the state services, the efficiency indicators were analyzed, questions of the effective organization of work with consumers of the hot line of a portal of the state services are considered.
Infokommunikacionnye tehnologii. 2013;11(1):85-86
85-86
CORRECTION OF SPATIAL LOSSES IN TELEVISION REGISTRATION SYSTEM WORKING IN CERTAIN CONDITIONS
Abstract
The special conditions related to the presence of radiation-protective observation system by thickness of several hundred millimeters between the object and lens camera, are making specifics in formation of the television image. The image on the surface of a matrix of the CCD is already broken chromatic and monochromatic aberrations of observation system, which leads to the emergence of spatial loss of information. The article discusses a method of correcting the spatial losses caused by monochromatic aberrations in observation system, are given the results of its practical implementation.
Infokommunikacionnye tehnologii. 2013;11(1):88-95
88-95
96-97
98-100
MODERN TECHNIQUES ARE USED TO EVALUATE THREATE AND VULNERABILITIES INFORMATION SYSTEMS
Abstract
Modern information systems trust the solution of the most diverse and important tasks: automatic control of technological processes and industrial enterprises, the automation of activities of banks, financial markets, insurance and trading companies, and so on. Grow the size and complexity of corporate systems. The importance of the task of ensuring the security of corporate information resources is understood as the management of companies, and customers. And already insufficient condition is the organization of the protection of individual segments of the information system. Proceeding from this, the requirements of information security should be aimed at ensuring an optimal regime of functioning of the information system as a whole.
Infokommunikacionnye tehnologii. 2013;11(1):100-105
100-105
THE MECHANISMS OF THE HIGLY QUALIFIED TECHNICAL SPECIALIST ADAPTIVE CORRECTING TRANING
Abstract
The highly qualified technical specialist adapting to the interested parties requirements training conditions is considered in that paper. It’s showing that the block-module system of the education process organization can reduce the higher technical education systems time delay and provide the subjects interaction stability.
Infokommunikacionnye tehnologii. 2013;11(1):105-111
105-111
111-114