Vol 10, No 3 (2012)
- Year: 2012
- Articles: 20
- URL: https://journals.eco-vector.com/2073-3909/issue/view/3244
Articles
HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION
Abstract
The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.
Infokommunikacionnye tehnologii. 2012;10(3):4-8
4-8
MULTILAYER PERCEPTRON PARALLEL MODEL CONSTRUCTION
Abstract
This article contains description of multilayer perceptron programming prototype, implemented using functional programming language Erlang. Architecture of this prototype is based on the asynchronous message passing concept and principle «one neuron - one process». In the end of this article the most interesting and important results of MLP performance tests are presented.
Infokommunikacionnye tehnologii. 2012;10(3):8-15
8-15
15-20
METHOD OF COMBINED APPLICATION OF FRACTIONALLY-SPACED PREEQUALIZATION AND SPREAD-SPECTRUM MODULATION FOR PLC-NETWORKS AND WIRELESS CHANNELS
Abstract
In the article a method of signal processing on the transmitter side is described, utilizing jointly fractionally-spaced equalization and spread-spectrum modulation. Thus two crucial problems of digital signal reliable transmission over the distorting channel with narrowband noise are solved: fractionally-spaced preequalization compensates for intersymbol interference caused by signal dis-tortion, and spread spectrum allows transmission system to be robust against electromagnetic interference. Method efficiency in the sense of error probability and transmit power minimizing is considered.
Infokommunikacionnye tehnologii. 2012;10(3):20-28
20-28
28-33
THE COMPATATIVE ANALYSIS OF ALGORITMS OF OPTICAL SIGNAL DISPERSION ELECTRONIC COMPENSATION
Abstract
Linear and nonlinear algorithms of electronic compensation of a dispersion of signals in fiber-optical lines of transfer are considered. Algorithms of an inverse filtration with restriction of a strip of frequencies and strengthening restriction, and also various variants of a nonlinear phase filtration are thus investigated. Results of modeling and the comparative analysis of these algorithms by an estimation of efficiency of indemnification of dispersion by criterion of Relay are resulted.
Infokommunikacionnye tehnologii. 2012;10(3):33-37
33-37
ESTIMATION OF STIRRING ACTION OF CURRENTS OF THE ELECTRIC ECHO IN MODERN TELEPHONE SYSTEMS Ivanov V.I
Abstract
By results of a user’s estimation of stirring action of currents of an electric echo recommendations about inclusion echo canceller devices in telephone channels on PSTN and networks under the concept «Voice over IP» (VoIP), АТМ, cellular are made, etc.
Infokommunikacionnye tehnologii. 2012;10(3):37-40
37-40
CONSTRUCTION OF PARALLEL SOFTWARE AGENTS’S BEHAVIOUR ALGORITHMS BY METHODS OF GENETIC PROGRAMMING
Abstract
The way of parallel algorithm’s construction on the basis of matrix intermediate structure with the use of the description of algorithm in the form of treelike structure is offered. Operations over the treelike structures are entered, allowing to produce parallel algorithms by methods of genetic programming. Logic levels on which evolution of algorithms of software agent’s behaviors proceeds are described and considered.
Infokommunikacionnye tehnologii. 2012;10(3):40-44
40-44
APPLICATION OF QUEUNING MODELS IN MONITORING ELECTRICAL PARAMETERS
Abstract
The article describes how to determine the pre-emergency condition at the electric power facilities with queuing models in order to reduce network traffic. The method is based on the application of the algorithm «leaky bucket» and adapted for use with pulsed electric supply meters.
Infokommunikacionnye tehnologii. 2012;10(3):44-47
44-47
ANALYSIS OF PROCESSES ENCAPSULATION AND DECAPSULATION VIDEO STREAMS IN IPTV NETWORKS FOR THE MONITORING SYSTEM
Abstract
The research of existing methods of encapsulation and decapsulation video streams in IP-based networks. Description OSI model of IPTV systems. Recommendations are given for assessment of resource equipment and efficient use available bandwidth in IPTV networks.
Infokommunikacionnye tehnologii. 2012;10(3):47-54
47-54
QUALITY CONTROL TREATMENT OF HYDROCARBONS AND THEIR DERIVATIVES IN MICROWAVE TECHNOLOGY FACILITIES-BASED OPTOELECTRONIC INFORMATION TECHNOLOGY
Abstract
The paper presents the methods and means of upgrading technology microwave systems handle complex hydrocarbons and their derivatives, based on the use of information technology in optoelectronic monitoring channels and designed to meet the challenges of completion of the processes controlling the microwave treatment of specified quality criteria.
Infokommunikacionnye tehnologii. 2012;10(3):54-60
54-60
60-67
67-70
CALCULATION OF PARABOLIC CYLINDER REFLECTOR ANTENNA
Abstract
The calculation of parabolic cylinder reflector antenna by 2D singular integral equation (2DSIE) method is represented in this paper. The system of 2DSIE for surface current density on the reflector and emitter calculation was reduced. The numerical algorithm of solving this system is represented. Radiation patterns of this antenna is represented.
Infokommunikacionnye tehnologii. 2012;10(3):71-77
71-77
NONLINEAR DISTORTIONS OF MULTIPLEXED SIGNAL IN WIRELESS LOCAL LOOP SYSTEM
Abstract
The aim of this paper is to analyze the effects of nonlinear distortions caused by the high power amplifier (or other nonlinear devices) and additive gaussian noise in direct-sequence code-division multiple access (DS-CDMA) systems. Analytical expression for the conditional and total probability density functions for the multiplexed CDMA signal had been derived, which could be used for obtaining the accurate error rate of the system and for specifying technical specifications for the baseband channel of DS-CDMA systems.
Infokommunikacionnye tehnologii. 2012;10(3):77-82
77-82
82-93
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
Abstract
Proposed the system of protection transmission stegomessages in images, allowing to identify the image file, the contents of a suspect a hidden message, in the absence of a priori information about the presence in the stego file and the law of its incorporation, and modify images with a further possible exception of the extraction stegomessages.
Infokommunikacionnye tehnologii. 2012;10(3):93-97
93-97
98-102
DECISION-MACING METHODS IN COINTROLLING STAFF OF A LARGE ORGANIZATION
Abstract
This paper presents a new approach to the existence of perfect methods of decision making in management personnel Institute larger organization-support structure and to optimize the job responsibilities of staff, and manage the preparation and conduct of complex evaluation of his competency.
Infokommunikacionnye tehnologii. 2012;10(3):102-106
102-106
106-110