Vol 13, No 1 (2015)

Articles

RESTORATION OF SOURCE ARRANGEMENT HEIGHT IN MATHEMATICAL MODEL OF THIN FILMS GROWTH ON SUBSTRATES

Tarasenko E.O., Gladkov A.V.

Abstract

Current research in the field of applied mathematics and computer science at the present time is the study of this little-studied physical process as a diffusion growth of thin spat-hella on substrates. Many domestic and foreign scientists have conducted research by decision analytical and numerical methods of initial-boundary value problems, which originally explicitly or implicitly assumed that the solution of the problem exists and is unique. In mathematical modeling there is often a question of solution of inverse problems arising in the research of the diffusion growth of thin spat-hella on substrates. This paper focuses on the solution of inverse problems encountered in the study of the mathematical model. The aim of the study is to develop analytical and numerical solution of the problem of recovering the height of the source atoms spat-hella. Achievement of this goal is based on the intended use of the re-sults and methods of mathematical physics equations, integral equations, mathematical analysis, partial differential equations, solid-state physics, crystallography. An analytical solution of the inverse prob-lem of recovering the height of the source of the atoms of the spat-hella deposited on the substrate. The numerical experiment by the growth of bismuth spat-hella on an aluminum substrate. Analysis of the results of the numerical experiment showed that the results presented in the article are consistent with experimental data. The absolute error of calculation does not exceed 2%. It should be noted that this research is of great practical value and can be used in microelectronics, creating large scale inte-grated circuits, etc.
Infokommunikacionnye tehnologii. 2015;13(1):7-11
pages 7-11 views

SELECTIVE PROPERTIES OF SEMICONDUCTOR PLASMA INHOMOGENEOUS LAYER

Panin D.N., Adamovich L.V.

Abstract

From the perspective of modern physics semiconductors represent the plasma, fully ionizer zed, but on average, electrically neutral gas. Semiconductor plasma has a number of specific ski features compared with gaseous plasma. First of all, the possibility of existence at very low temperatures down to absolute zero and a high concentration of particles. Moreover, this electrodynamic environment has properties of high-pass filter. In this paper, based on the trim account of the differential equation for the reflection coefficient was able to obtain the frequency characteristics of attenuation for inhomogeneous plasma layers at different angles of incidence of the electromagnetic wave. The problem for the homogeneous layer at various angles of incidence of the wave, as well as for the parabolic and linear layers with different angle of incidence of the polarized wave. The analysis of the frequency characteristics of attenuation in the passband, and lane keeping. It is shown that the design of microwave filters range it is best to use a frequency characteristic of the attenuation introduced by the semiconductor layer of plasma with a parabolic profile of the electron concentration. This characteristic has a large slew rate, transition region, compared with a linear profile, and less attenuation in the passband, compared with a uniform profile
Infokommunikacionnye tehnologii. 2015;13(1):12-17
pages 12-17 views

Non-armored fiber optic cable protection from the freezing water pressure in fiber optic cable duct

Nikulina T.G.

Abstract

Today the «optical cable in the duct» technology at installation of cable lines is widely used. Distinctive feature of this technology is application of cables without armor at installation. The analysis of duct cable lines operating experience shows that at duct damage and loss of sealing water gets to a duct. The soil in winter time freezes to a depth of the duct laying and even more over large territory in Russia. It leads to freezing of an optical cable in ice if the duct had water filling. Thus the cable without armor can appear in more severe conditions than underground optical cable with armor which is traditionally used. There is a question how to protect an optical cable from ice loadings in case of damage of a duct. In article the existing ways of protection of a cable in a duct and possible difficulties of their realization are analyzed. It is offered to apply to protection of an optical cable the damping elements. Dampers can be used in a cable design or be laid together with a cable in a duct. It is offered to use the micro ducts as dampers. Diameters and number of dampers for various combinations of diameters of cables and ducts are calculated. At calculations possible extent of compression of a damper was considered. The received results of researches can be used at realization of the offered protection of an optical cable from ice loadings in a duct.
Infokommunikacionnye tehnologii. 2015;13(1):17-22
pages 17-22 views

Switching time and switching capacity of acousto-optical switch

Davidov A.I., Mukhamadiev A.A., Urakseev M.A.

Abstract

Acousto-optic switch can route optical signals in a branched fiber-optical network providing the input optical fiber switching to the output fiber-optic array. The principle of its work is based on light beam diffraction by ultrasonic wave, created in optically transparent media. The refractive index of an optical medium is altered by the sound frequency. Based on the acousto-optic deflector properties analysis, expressions defining acousto-optic switch capacity and switching time are deduced. Acousto-optic switch capacity is the number of switching channels, which are determined by the acousto-optic deflector resolution, namely the number of distinct light point in space, which provides the deflector at a discrete sound frequency change. The number of distinct points is determined by maximum angular range and the Rayleigh criterion - minimum angular intervals wherein two light points will be visible. Linking resolution characteristics and acousto-optic deflector parameters we obtained that the acousto-optic switch capacity is determined by the acousto-optic deflector aperture, the sound wave velocity, and the frequency operating range. The optical signal can’t be transmitted in less time than the acoustic wave travel through the solid media of the acousto-optic deflector. Therefore, the switching time is the value for which the acoustic wave passes through the optical field in the transverse direction.
Infokommunikacionnye tehnologii. 2015;13(1):22-27
pages 22-27 views

Research and training complex of networks with channel and packet switching

Vasin N.N., Voyschev N.V., Irbakhtin A.A., Teleshevsky S.G.

Abstract

In modern world communication enterprises circuit-switched and packet-switching equipment work together. Switched channels equipment usually provides transportation services for packet-switched networks. Therefore, it became necessary to educate students technology of circuit-switched equipment and packet-switched equipment interoperability. To perform this task, educational and research complex was established at PSUTI, which includes a modular network transport equipment (MNTE), as well as switches and routers by Cisco Systems Inc. The paper presents the characteristics of network equipment and management systems «MNTE-Network». MNTE equipment uses two types of modules: linear and tributaries. Linear modules provide high-speed data transmission over fiber-optic lines of STM-1, STM-4. Tributary modules together with linear modules allow creating various network elements - switches and multiplexers. Interactive method of training based on modular network transport equipment and apparatus MNTE Cisco was developed. «MNTE-Network» Management System allows for remote access and configure the network elements (switches and multiplexers). The secure connection (VPN) is made possible with the usage of Cisco made equipment. The flexible structure of teaching and research complex allows students to manage, customize and configure the system, and conduct research.
Infokommunikacionnye tehnologii. 2015;13(1):28-33
pages 28-33 views

Development of software unit for research of telecommunication systems with dynamic topology in the simulation environment “Network Simulator”

Dmitriev V.N., Sorokin A.A., Reznikov P.S., Chan Q.T.

Abstract

This paper describes the development of a software module for the simulation of communication systems with dynamic network topology. Developed module allows you to explore the effect of moving the network nodes on the quality of the transmitted information. With the help of the developed module the work of the communication system with dynamic network topology is analyzed. Simulation time is 2 to 6 hours. Transfer rate facilities ranged from 20 to 80 kmph. The data transfer rate was from 0.5 to 32 mbps. The experimental results show that the network is suitable for the provision of real-time traffic services (as online application) and data traffic by condition end2end delay of packet. By condition, the probability of packet loss this communication system suitable for the transmission of real-time traffic and for normal data traffic requires the use of a transport layer protocol that guarantees delivery of data packets, as TCP. Investigate methods for increase the coverage area of public communication systems can be used to provide Internet access to transport facilities such as river vessel, railway train or road transport, as buses or cargo vehicular.
Infokommunikacionnye tehnologii. 2015;13(1):33-39
pages 33-39 views

Modern global network traffic model for simulation system

Privalov A.Y., Tsarev A.A.

Abstract

Currently, the impact of traffic self-similarity on different aspects of telecommunications is still an important research topic. One of the important problems in this field is developing tractable traffic models and evaluating their ability to match closely real traffic behavior. The first purpose of this paper is to present OMNET++ realization of our modification of well-known self-similar traffic model «M/G/∞ Input». Modified model is able to capture several characteristics of real WAN traffic together, including Hurst parameter, probability distribution of traffic value and autocorrelation function (ACF) of traffic value. Another purpose of this paper is to make parameters of modified «M/G/∞ Input» model more tractable from the practical point of view. An OMNET package with an implementation of a useful modification of well-known self-similar traffic model is presented. The package is designed for analysis of real WAN traffic traces, identification of model parameters and generation of a synthetic traffic, which is close to real one by a number of characteristics simultaneously. These characteristics include traffic value probability distribution, normalized autocorrelation function and Hurst parameter. Performance of the package was tested with traffic traces from CAIDA and Internet Traffic Archive collections. An interesting phenomenon of multimodal «saw-like» form of the probability distribution of modern WAN traffic was reviled in these experiments.
Infokommunikacionnye tehnologii. 2015;13(1):40-46
pages 40-46 views

Algorithm for traffic balancing in ETHERNET ring networks

Lihtzinder B.Y., Ryzhih S.V.

Abstract

For today the majority data networks are working on technology Ethernet, and used in a ring topology, thereby allowing optimal network reliability. Most of the equipment of such networks is access switches having from 8 to 48 ports for connecting subscribers. Such switches usually only work with frames, that is level 2 model OSI. But such a construction, in addition to simplicity, reliability and low cost, has its drawbacks, such as the possibility of Ethernet storms that can bring the entire network. The process of storms underlies at technology of Ethernet, namely in the absence of the removal mechanism of broadcast frames from the exclusive network. Consequently, this technology does not allow the existence of more than one communication switching channel between the two points exchanging information. For protection from storms special protocols to block redundant switching channels between the communications equipment are used. There are quite a lot of such protocols today, such as STP, PVSTP, RSTP, but the most common is MSTP. But they all have the same function, based on the finding of redundant channels of communication between the two switches. In finding happens, block all but one, selected on the basis of comparison of parameters based on the coefficients dependent on the bandwidth of the channel. Thereby, there is prohibition of the transmission of traffic on all channels except the selected one. Based on the basic principle these protocols impose restrictions on the use of all possible communication channels. This approach results in an inefficient allocation of all available bandwidth in the network. To solve this problem, we developed an algorithm that gives an opportunity to use all available network bandwidth, if it needs, without affecting to the quality of service for existing subscribers. Our algorithm uses the built-in mechanisms in existing protocols, thereby it allows at low changes improving the efficiency of the network to be almost doubled.
Infokommunikacionnye tehnologii. 2015;13(1):46-50
pages 46-50 views

Service oriented model of telecommunication system

Dementiev D.N., Grishakov V.G., Loginov I.V., Hristenko D.V.

Abstract

The need of telecommunication planning development for network according to requirements in the telecommunication services requires the model of telecommunication system, which can be used to calculate the limit of resources to administrative tasks. The approach to telecommunication system service-oriented modelling is viewed in the article. This approach is based on service viewpoint of telecommunication network and process viewpoint of its management system. The telecommunication system model is represented as a set of management system model and telecommunication network model (management object). Management system model is represented as a formalized describing of telecommunication network administrative processes parameters in the term of eTOM methodology. This model describes the parameters of process such as maturity and productivity. This model is destined to calculate the limit of resources to administrative tasks for designed telecommunication network. Telecommunication network model is represented as a set of telecommunication services, which are on different stages of lifecycle. The main component of telecommunication network model is telecommunication service model. It consists of several description components: parameters of service quality, service of level of agreement, lifecycle parameters, management and maintenance systems. Suggested service-oriented telecommunication system model is considered telecommunication services on different stages of lifecycle. It allows analyzing telecommunication system as a temporal object and planning its development.
Infokommunikacionnye tehnologii. 2015;13(1):51-58
pages 51-58 views

Dissertation and innovative perspectives of scientific knowledge implementation

Maslov O.N.

Abstract

The ways of practical scientific knowledge application in the complex systems science (CS) of organizational and technical (holonic) type are discussed in the article. Consumers of scientific knowledge are the decision makers (DM): they are managers, experts and other specialists in business management. The purpose of the first method is an information exchange between decision-makers through publications (theses, monographs, articles, essays, research papers). In the article, the fields related to information exchange conventionally are called the dissertation science. The purpose of the second method is technical progress, aimed at innovation in the field of business. Knowledge related to technological progress is called innovative knowledge in this article, and the area of science associated with them is innovative science. Decision-makers in the management of the CS used two kinds of knowledge: verified and axiological. Verified knowledge is the result of research. They are objective, repeatedly tested and widely known. Cost of verified knowledge equals to the price of training DM. Axiological knowledge is subjective and unique, known for a wide range of decision-makers (or even a single person). They have a contractual commercial price that is equal to their cost of risk. Innovations are novelties dramatically improving the work of the CS. Effective innovations related to the axiological knowledge at the stage of successful verification - they are called innovative knowledge. The article describes the features of the use of verified and axiological knowledge in dissertation and innovative science. Criticism of modern quackery, which plays an important role in both cases, is presented in the article.
Infokommunikacionnye tehnologii. 2015;13(1):58-67
pages 58-67 views

AL-ARQ algorithm for video streaming IN WLAN

Chunaev A.V., Abilov A.V., Pavlova M.M.

Abstract

Many external factors influence the quality of video-streaming in WLAN and fragments of the video can be lost, delayed or have changed sequence. The potential to improve the quality of the video is to develop methods by their implementation at the application level of the OSI model, which does not entail the need for changing in the standards of the lower level and thus simplifies the implementation process by installing the software on client nodes. Article is devoted to the development and research of the effectiveness of the AL-ARQ algorithm (Application Layer ARQ) to correct the packet losses of streaming video data at the application layer of the OSI model in the WLAN. The quality of video delivery in real time is increased by repeated fragments of lost video data on the application layer of the OSI model. Developed formats of messages are used both for delivery of the video fragments and request for retransmission. We offer the software implementation of the AL-ARQ algorithm. The experimental study of the effectiveness of the AL-ARQ algorithm is performed in a packet losses condition during transmission over WLAN. As a criterion for the effectiveness for the proposed algorithm the packet loss ratio is used. The results prove the effectiveness of the proposed algorithm.
Infokommunikacionnye tehnologii. 2015;13(1):68-73
pages 68-73 views

Research of polarization properties of antenna based on magnetized gyromagnetic resonator with different volume resonators

Soldatov A.A., Lozhkin L.D.

Abstract

In the article is inspected the antenna on the basis of magnetized gyromagnetic resonator (GR). Antenna consists of the feeder line, the magnetizing coil, volumetric disk resonator and spherical gyromagnetic resonator (YIG). Magnetized gyromagnetic resonator is excited through the feeder line microwave field and then, in turn, excites the volume resonator (RR), which radiates into the space of the electromagnetic field of a rotating polarization. Moreover, the coefficient of ellipticity of the radiation field is close to unity in the radiation direction. This emitter has a number of unique properties, which are provided by magnetized GR: radiation field circular polarization; electric switching on-Board rotation, high frequency selectivity and the magnetic reconstruction of the Central frequency radiation-treatment. The direction of rotation of the vector field is due to the switching of the current in the electromagnetic-Nita. The shift of the Central frequency of the radiation can be produced by changing the current in padminidevi-ing the spool of wire. In the axial direction, the coefficient of ellipticity of the radiation field is close to the unit-n. Experimental measurements of antenna parameters are on the basis of magnetized GR. In the article the analysis of characteristics of the antenna on the gyromagnetic resonator with different types of open volume roadways resonators are studied. We investigated the ER with a metal disk on the basis of dielectric and ferrite substrate, a ring radiator on a ferrite substrate and the PR type «glass». Antenna with some types of EOS provides a higher gain (RR type «glass»), others close to one of the coefficients are consistent with a person of the ellipticity (disk OR on a ferrite substrate). In more detail, polarization characteristics of the antenna are important for the creation of the probes and modulators of the ellipticity of the radiation. The curves of the dependence of the ellipticity coefficient in space and formulae for calculation of the characteristics of antennas based magnetized GR. The calculated and experimental data is close enough match.
Infokommunikacionnye tehnologii. 2015;13(1):73-77
pages 73-77 views

Perspectives of internet-tv system development for video streaming delivery to the end-users

Balobanov V.G., Nagornaya M.Y., Galochkin V.A.

Abstract

This article discusses issues that are contained in a new discipline called «Television broad-casting», which will be taught to students of the Povolzhskiy State University of Telecommunications and Informatics. In one of the sections of the discipline delivery of video over the Internet will be studied. This article contains the basic ideas of implementing Internet tech-nology broadcasting, as well as a brief description of services received by subscribers. The publication describes in detail the features of video transmission over the Internet, the practical implementation of television broadcasting over the Internet. The text provides illustrations that explain the problems in question - the dissemination of information on the Internet, multicast traffic transmission.
Infokommunikacionnye tehnologii. 2015;13(1):77-82
pages 77-82 views

Steganography algorithms robust to active attacs

Smagin A.A., Valishin M.F.

Abstract

The aim of this work is to develop a steganographic algorithm, which is able to organize covert channel data in terms of a targeted attack on a container. Robust against an active attack on a steganographic algorithms is used to solve a number of applied problems. For example, the task of adding a new functionality to a fixed format. It is proposed to use the state diagram to describe the possible transformations of a digital object as a result of the attacks. The transition between the two states is characterized by the distortion introduced in the original object, and if the distortion produces a number of different objects, the corresponding state in the diagram is marked with infinity symbolizes sign which the attitude of "one-to-many". Thus, the problem of constructing robust against an active attack steganography is reduced to obtaining an algorithm that is able to extract hidden information from all the states in the diagram. There are two theoretical methods of construction robust against an active attack steganography: method of reducing a plurality of containers and method of assessing distortion. The first method is based on the assumption that among a plurality of containers. There can be such containers that the attack does not destroy embedded information. The second method allows you to build a robust embedding algorithm if the distortion introduced by the attack is limited by modulo in a metric space of containers. This paper gives a practical application of the proposed methods for the construction of steganography system that is robust against conversion of color images to grayscale. The program implementation in the programming language Python is given.
Infokommunikacionnye tehnologii. 2015;13(1):82-88
pages 82-88 views

Interference protection for telecommunication wireless devices

Abbasova T.S.

Abstract

The article deals with the problems of measurement processes, analysis and diagnostics of equipment in telecommunication systems, including local radio network data transmission and wireless devices. The scheme RFID ports telecommunications equipment includes technology devices like Bluetooth, RFI radio local area networks and equipment data using wideband modulation techniques have a mutual influence on each other. The research provides the assessment of co-channel interference and blocking devices carried by the example of Bluetooth technology with the help of the method of minimal cumulative losses. The mechanisms of interference with Bluetooth various sources of interference. Carried out calculations of protective distances on chosen method for different noise sources with 100% -Working cycles transmitters when exposed to Bluetooth enabled devices, depending on the mechanism of interference. The results can be used to calculate the electromagnetic compatibility of wireless short-range devices for testing telecommunication equipment communication systems.
Infokommunikacionnye tehnologii. 2015;13(1):88-93
pages 88-93 views

Cryptography and steganography study in Povolzhskiy State University of Telecommunications and Informatics (Samara, Russia) and Shumen University (Shumen, Bulgaria)

Alexeev A.P., Stanev S.S.

Abstract

The problems of cryptography and steganography are taught at two universities - PGUTI (Samara) and the University of Shumen (Bulgaria) on basis of scientific cooperation agreement. It is a brief overview of the initial course content of "Informatics" in PSUTI. The course teaches students to learn the basic concepts of computer science and get a first glimpse of data protection methods of cryptography and steganography. There are basic ideas of published works. The first work on steganography in PSUTI were published in 2002. A few original ideas are described. For example, in the cryptosystem manage operations in addition to the exclusive-OR is used to encrypt the logical equivalence of the operation, as well as arithmetic operations of addition and subtraction. Another cryptosystem uses a secure communication protocol TCP / IP. Thus there is a deliberate change in the length of the transmitted packets. In Shumen University since 2004 cryptography and steganography are studied in several disciplines for students of «Safety Management» and «Computer Science». In 2010, the Faculty of Mathematics and Informatics in Bulgaria introduced the course «Computer Steganography» for the first time. Research on steganology was conducted by the scientific research Laboratory «Computer Security», which was developed by the cluster computer system with a total capacity of 180 GFLOPS and the energy efficiency of 19 MFLOPS / Watt. According to the study conducted by the teachers together with students at two universities, several monographs and textbooks have been published as well as articles in scientific and technical journals, more than 70 scientific papers were presented at scientific conferences, the patents were received, a number of theses have been prepared and defended. An agreement on creative collaboration was concluded between PSUTI and SHU universities.
Infokommunikacionnye tehnologii. 2015;13(1):93-99
pages 93-99 views

Stimulation of study and cognitive activity for students of technical university

Vitevskaya O.V.

Abstract

Socio-economic conditions require graduates of technical colleges to adapt qualities such as creativity, communication skills and willingness to the new working conditions. Observations show that many students learn to the best of their ability. This is because teachers do not always apply the forms and methods of teaching to promote an active cognitive activity of students. Traditional training in high school contains lecture, seminar, practical training, and laboratory work and independent work of students. Seminars provide an opportunity to collectively address these or other questions; discuss emerging issues, a deeper understanding of the artistic theme. Practical exercises are designed to strengthen knowledge, transfer them to a new situation, and give the students the general concepts and basic skills in solving practical tasks and situations. The laboratory lessons the students are acquainted with new methods and work to melt them into micro groups independently. The lecture is the basic form of learning. The main purpose of the lecture is to provide the theoretical basis of the study, develop interest in training activities and specific academic discipline, and form the learner Guide for independent work. The main task of the teacher is to use all forms of education technology, which would increase the creative and cognitive activity of students: apply computer technology to conduct business games, organize cooperation students to solve a specific task.
Infokommunikacionnye tehnologii. 2015;13(1):
views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies