Vol 10, No 3 (2012)

Articles

HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION

Afonin M.S., Gladkov A.V., Maslennikova E.V., Chervyakov N.I.

Abstract

The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.
Infokommunikacionnye tehnologii. 2012;10(3):4-8
pages 4-8 views

MULTILAYER PERCEPTRON PARALLEL MODEL CONSTRUCTION

Kazakov V.G., Plotnikova N.P., Tesley V.V., Fedosin S.A.

Abstract

This article contains description of multilayer perceptron programming prototype, implemented using functional programming language Erlang. Architecture of this prototype is based on the asynchronous message passing concept and principle «one neuron - one process». In the end of this article the most interesting and important results of MLP performance tests are presented.
Infokommunikacionnye tehnologii. 2012;10(3):8-15
pages 8-15 views

SOUND SIGNAL FILTRING ALGORITHMS BASED ON U-TRANSFORM

Gai V.E.

Abstract

Algorithms of filtering sound signals based on integrated-differential (U-conversion) are reviewed. The results indicate the possibility of using the proposed algorithms for solving the task.
Infokommunikacionnye tehnologii. 2012;10(3):15-20
pages 15-20 views

METHOD OF COMBINED APPLICATION OF FRACTIONALLY-SPACED PREEQUALIZATION AND SPREAD-SPECTRUM MODULATION FOR PLC-NETWORKS AND WIRELESS CHANNELS

Bagmanov V.K., Lyubopytov V.S., Sultanov A.K., Tlyavlin A.Z.

Abstract

In the article a method of signal processing on the transmitter side is described, utilizing jointly fractionally-spaced equalization and spread-spectrum modulation. Thus two crucial problems of digital signal reliable transmission over the distorting channel with narrowband noise are solved: fractionally-spaced preequalization compensates for intersymbol interference caused by signal dis-tortion, and spread spectrum allows transmission system to be robust against electromagnetic interference. Method efficiency in the sense of error probability and transmit power minimizing is considered.
Infokommunikacionnye tehnologii. 2012;10(3):20-28
pages 20-28 views

SIMULATORS OF WIRELESS MANET-NETWORKS

Zholobov A.N., Prozorov D.E., Romanov S.V.

Abstract

Simulators of wireless networks, allowing to research and develop own routing protocols are considered in the article. Criteria of an estimation of network simulators and their advantages and limitations are denoted.
Infokommunikacionnye tehnologii. 2012;10(3):28-33
pages 28-33 views

THE COMPATATIVE ANALYSIS OF ALGORITMS OF OPTICAL SIGNAL DISPERSION ELECTRONIC COMPENSATION

Bourdin A.V., Grigorov I.V., Tsveybelman E.V.

Abstract

Linear and nonlinear algorithms of electronic compensation of a dispersion of signals in fiber-optical lines of transfer are considered. Algorithms of an inverse filtration with restriction of a strip of frequencies and strengthening restriction, and also various variants of a nonlinear phase filtration are thus investigated. Results of modeling and the comparative analysis of these algorithms by an estimation of efficiency of indemnification of dispersion by criterion of Relay are resulted.
Infokommunikacionnye tehnologii. 2012;10(3):33-37
pages 33-37 views

ESTIMATION OF STIRRING ACTION OF CURRENTS OF THE ELECTRIC ECHO IN MODERN TELEPHONE SYSTEMS Ivanov V.I

Ivanov V.I.

Abstract

By results of a user’s estimation of stirring action of currents of an electric echo recommendations about inclusion echo canceller devices in telephone channels on PSTN and networks under the concept «Voice over IP» (VoIP), АТМ, cellular are made, etc.
Infokommunikacionnye tehnologii. 2012;10(3):37-40
pages 37-40 views

CONSTRUCTION OF PARALLEL SOFTWARE AGENTS’S BEHAVIOUR ALGORITHMS BY METHODS OF GENETIC PROGRAMMING

Kolchugina E.A.

Abstract

The way of parallel algorithm’s construction on the basis of matrix intermediate structure with the use of the description of algorithm in the form of treelike structure is offered. Operations over the treelike structures are entered, allowing to produce parallel algorithms by methods of genetic programming. Logic levels on which evolution of algorithms of software agent’s behaviors proceeds are described and considered.
Infokommunikacionnye tehnologii. 2012;10(3):40-44
pages 40-44 views

APPLICATION OF QUEUNING MODELS IN MONITORING ELECTRICAL PARAMETERS

Vorobyov A.E., Lichtzinder B.Y., Raskin A.Y.

Abstract

The article describes how to determine the pre-emergency condition at the electric power facilities with queuing models in order to reduce network traffic. The method is based on the application of the algorithm «leaky bucket» and adapted for use with pulsed electric supply meters.
Infokommunikacionnye tehnologii. 2012;10(3):44-47
pages 44-47 views

ANALYSIS OF PROCESSES ENCAPSULATION AND DECAPSULATION VIDEO STREAMS IN IPTV NETWORKS FOR THE MONITORING SYSTEM

Karjakin V.L., Karjakin D.V., Kosenko S.G.

Abstract

The research of existing methods of encapsulation and decapsulation video streams in IP-based networks. Description OSI model of IPTV systems. Recommendations are given for assessment of resource equipment and efficient use available bandwidth in IPTV networks.
Infokommunikacionnye tehnologii. 2012;10(3):47-54
pages 47-54 views

QUALITY CONTROL TREATMENT OF HYDROCARBONS AND THEIR DERIVATIVES IN MICROWAVE TECHNOLOGY FACILITIES-BASED OPTOELECTRONIC INFORMATION TECHNOLOGY

Morozov O.G., Samigullin R.R.

Abstract

The paper presents the methods and means of upgrading technology microwave systems handle complex hydrocarbons and their derivatives, based on the use of information technology in optoelectronic monitoring channels and designed to meet the challenges of completion of the processes controlling the microwave treatment of specified quality criteria.
Infokommunikacionnye tehnologii. 2012;10(3):54-60
pages 54-60 views

PROJECT DECISIONS MACING BASED ON «SITUATION - MANAGEMENT STRATEGY - OPERATION» MODEL TO PHYSICAL DEFENSE SYSTEM UPGRADING

Borovsky A.S., Tarasov A.D.

Abstract

It is describing method to specify required operations for physical defense system of potentially-dangerous objects creation and improvement. Method based on management strategy identifying with fuzzy situation network using.
Infokommunikacionnye tehnologii. 2012;10(3):60-67
pages 60-67 views

ACTIVE MIND MAPS

Ruban I.A.

Abstract

In the article the problem of the information processing into knowledge is considered. The method of active mind maps is proposed for express meaning into the system of categorizing information.
Infokommunikacionnye tehnologii. 2012;10(3):67-70
pages 67-70 views

CALCULATION OF PARABOLIC CYLINDER REFLECTOR ANTENNA

Klyuev D.S.

Abstract

The calculation of parabolic cylinder reflector antenna by 2D singular integral equation (2DSIE) method is represented in this paper. The system of 2DSIE for surface current density on the reflector and emitter calculation was reduced. The numerical algorithm of solving this system is represented. Radiation patterns of this antenna is represented.
Infokommunikacionnye tehnologii. 2012;10(3):71-77
pages 71-77 views

NONLINEAR DISTORTIONS OF MULTIPLEXED SIGNAL IN WIRELESS LOCAL LOOP SYSTEM

Gurevich V.E., Egorov S.G.

Abstract

The aim of this paper is to analyze the effects of nonlinear distortions caused by the high power amplifier (or other nonlinear devices) and additive gaussian noise in direct-sequence code-division multiple access (DS-CDMA) systems. Analytical expression for the conditional and total probability density functions for the multiplexed CDMA signal had been derived, which could be used for obtaining the accurate error rate of the system and for specifying technical specifications for the baseband channel of DS-CDMA systems.
Infokommunikacionnye tehnologii. 2012;10(3):77-82
pages 77-82 views

VERBAL INVORMATION ACTIVE PROTECTION: RESERVES AND NEW POSSIBILITIES

Evgrashin A.V., Maslov O.N., Ryabushkin A.V., Shashenkov V.F.

Abstract

Methods and aids of increase of confidential information (CI) protection systems from information leakage on the acoustic and vibroacoustic channels efficiency are considered in the article.
Infokommunikacionnye tehnologii. 2012;10(3):82-93
pages 82-93 views

PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES

Azhmuhamedov I.M., Kolesova N.A.

Abstract

Proposed the system of protection transmission stegomessages in images, allowing to identify the image file, the contents of a suspect a hidden message, in the absence of a priori information about the presence in the stego file and the law of its incorporation, and modify images with a further possible exception of the extraction stegomessages.
Infokommunikacionnye tehnologii. 2012;10(3):93-97
pages 93-97 views

USING NEURAL NETWORKS FOR CRYPTANALYSIS OF CIPHER «GRAPHICS ARRAY»

Orlov V.V., Alekseev A.P., Nazarenko P.A.

Abstract

This article discusses the possibility of using neural networks for cryptanalytic cipher «Graphical matrix».
Infokommunikacionnye tehnologii. 2012;10(3):98-102
pages 98-102 views

DECISION-MACING METHODS IN COINTROLLING STAFF OF A LARGE ORGANIZATION

Buzuev A.I., Yagovkin N.G.

Abstract

This paper presents a new approach to the existence of perfect methods of decision making in management personnel Institute larger organization-support structure and to optimize the job responsibilities of staff, and manage the preparation and conduct of complex evaluation of his competency.
Infokommunikacionnye tehnologii. 2012;10(3):102-106
pages 102-106 views

MUSEUM IN THE 21st CENTURY: INTEGRATION OF DIGITAL TECHNOLOGIES IN THE EXHIBITION SPASE

Smirnova T.A.

Abstract

The article discusses the development of museum institution at the modern stage in the light of use the digital technologies in the museum exposition, the use of new multimedia tools.
Infokommunikacionnye tehnologii. 2012;10(3):106-110
pages 106-110 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies