卷 10, 编号 3 (2012)
- 年: 2012
- 文章: 20
- URL: https://journals.eco-vector.com/2073-3909/issue/view/3244
Articles
HIERARCHIC ACCESS CONTROL SYSTEM ON THE BASIS OF ELLIPTIC CRYPTOGRAPHY WITH SELF-ORGANIZATION
摘要
The paper presents a system to control access to confidential information transmitted over the network, based on elliptical cryptography. The system is focused on ad hoc networks. The proposed system is characterized by low hardware requirements and lack of main server. The paper presents the analysis of the proposed security access control.
Infokommunikacionnye tehnologii. 2012;10(3):4-8
4-8
MULTILAYER PERCEPTRON PARALLEL MODEL CONSTRUCTION
摘要
This article contains description of multilayer perceptron programming prototype, implemented using functional programming language Erlang. Architecture of this prototype is based on the asynchronous message passing concept and principle «one neuron - one process». In the end of this article the most interesting and important results of MLP performance tests are presented.
Infokommunikacionnye tehnologii. 2012;10(3):8-15
8-15
SOUND SIGNAL FILTRING ALGORITHMS BASED ON U-TRANSFORM
摘要
Algorithms of filtering sound signals based on integrated-differential (U-conversion) are reviewed. The results indicate the possibility of using the proposed algorithms for solving the task.
Infokommunikacionnye tehnologii. 2012;10(3):15-20
15-20
METHOD OF COMBINED APPLICATION OF FRACTIONALLY-SPACED PREEQUALIZATION AND SPREAD-SPECTRUM MODULATION FOR PLC-NETWORKS AND WIRELESS CHANNELS
摘要
In the article a method of signal processing on the transmitter side is described, utilizing jointly fractionally-spaced equalization and spread-spectrum modulation. Thus two crucial problems of digital signal reliable transmission over the distorting channel with narrowband noise are solved: fractionally-spaced preequalization compensates for intersymbol interference caused by signal dis-tortion, and spread spectrum allows transmission system to be robust against electromagnetic interference. Method efficiency in the sense of error probability and transmit power minimizing is considered.
Infokommunikacionnye tehnologii. 2012;10(3):20-28
20-28
SIMULATORS OF WIRELESS MANET-NETWORKS
摘要
Simulators of wireless networks, allowing to research and develop own routing protocols are considered in the article. Criteria of an estimation of network simulators and their advantages and limitations are denoted.
Infokommunikacionnye tehnologii. 2012;10(3):28-33
28-33
THE COMPATATIVE ANALYSIS OF ALGORITMS OF OPTICAL SIGNAL DISPERSION ELECTRONIC COMPENSATION
摘要
Linear and nonlinear algorithms of electronic compensation of a dispersion of signals in fiber-optical lines of transfer are considered. Algorithms of an inverse filtration with restriction of a strip of frequencies and strengthening restriction, and also various variants of a nonlinear phase filtration are thus investigated. Results of modeling and the comparative analysis of these algorithms by an estimation of efficiency of indemnification of dispersion by criterion of Relay are resulted.
Infokommunikacionnye tehnologii. 2012;10(3):33-37
33-37
ESTIMATION OF STIRRING ACTION OF CURRENTS OF THE ELECTRIC ECHO IN MODERN TELEPHONE SYSTEMS Ivanov V.I
摘要
By results of a user’s estimation of stirring action of currents of an electric echo recommendations about inclusion echo canceller devices in telephone channels on PSTN and networks under the concept «Voice over IP» (VoIP), АТМ, cellular are made, etc.
Infokommunikacionnye tehnologii. 2012;10(3):37-40
37-40
CONSTRUCTION OF PARALLEL SOFTWARE AGENTS’S BEHAVIOUR ALGORITHMS BY METHODS OF GENETIC PROGRAMMING
摘要
The way of parallel algorithm’s construction on the basis of matrix intermediate structure with the use of the description of algorithm in the form of treelike structure is offered. Operations over the treelike structures are entered, allowing to produce parallel algorithms by methods of genetic programming. Logic levels on which evolution of algorithms of software agent’s behaviors proceeds are described and considered.
Infokommunikacionnye tehnologii. 2012;10(3):40-44
40-44
APPLICATION OF QUEUNING MODELS IN MONITORING ELECTRICAL PARAMETERS
摘要
The article describes how to determine the pre-emergency condition at the electric power facilities with queuing models in order to reduce network traffic. The method is based on the application of the algorithm «leaky bucket» and adapted for use with pulsed electric supply meters.
Infokommunikacionnye tehnologii. 2012;10(3):44-47
44-47
ANALYSIS OF PROCESSES ENCAPSULATION AND DECAPSULATION VIDEO STREAMS IN IPTV NETWORKS FOR THE MONITORING SYSTEM
摘要
The research of existing methods of encapsulation and decapsulation video streams in IP-based networks. Description OSI model of IPTV systems. Recommendations are given for assessment of resource equipment and efficient use available bandwidth in IPTV networks.
Infokommunikacionnye tehnologii. 2012;10(3):47-54
47-54
QUALITY CONTROL TREATMENT OF HYDROCARBONS AND THEIR DERIVATIVES IN MICROWAVE TECHNOLOGY FACILITIES-BASED OPTOELECTRONIC INFORMATION TECHNOLOGY
摘要
The paper presents the methods and means of upgrading technology microwave systems handle complex hydrocarbons and their derivatives, based on the use of information technology in optoelectronic monitoring channels and designed to meet the challenges of completion of the processes controlling the microwave treatment of specified quality criteria.
Infokommunikacionnye tehnologii. 2012;10(3):54-60
54-60
PROJECT DECISIONS MACING BASED ON «SITUATION - MANAGEMENT STRATEGY - OPERATION» MODEL TO PHYSICAL DEFENSE SYSTEM UPGRADING
摘要
It is describing method to specify required operations for physical defense system of potentially-dangerous objects creation and improvement. Method based on management strategy identifying with fuzzy situation network using.
Infokommunikacionnye tehnologii. 2012;10(3):60-67
60-67
ACTIVE MIND MAPS
摘要
In the article the problem of the information processing into knowledge is considered. The method of active mind maps is proposed for express meaning into the system of categorizing information.
Infokommunikacionnye tehnologii. 2012;10(3):67-70
67-70
CALCULATION OF PARABOLIC CYLINDER REFLECTOR ANTENNA
摘要
The calculation of parabolic cylinder reflector antenna by 2D singular integral equation (2DSIE) method is represented in this paper. The system of 2DSIE for surface current density on the reflector and emitter calculation was reduced. The numerical algorithm of solving this system is represented. Radiation patterns of this antenna is represented.
Infokommunikacionnye tehnologii. 2012;10(3):71-77
71-77
NONLINEAR DISTORTIONS OF MULTIPLEXED SIGNAL IN WIRELESS LOCAL LOOP SYSTEM
摘要
The aim of this paper is to analyze the effects of nonlinear distortions caused by the high power amplifier (or other nonlinear devices) and additive gaussian noise in direct-sequence code-division multiple access (DS-CDMA) systems. Analytical expression for the conditional and total probability density functions for the multiplexed CDMA signal had been derived, which could be used for obtaining the accurate error rate of the system and for specifying technical specifications for the baseband channel of DS-CDMA systems.
Infokommunikacionnye tehnologii. 2012;10(3):77-82
77-82
VERBAL INVORMATION ACTIVE PROTECTION: RESERVES AND NEW POSSIBILITIES
摘要
Methods and aids of increase of confidential information (CI) protection systems from information leakage on the acoustic and vibroacoustic channels efficiency are considered in the article.
Infokommunikacionnye tehnologii. 2012;10(3):82-93
82-93
PROTECTION OF TRANSFER STEGAMESSAGES IN IMAGES
摘要
Proposed the system of protection transmission stegomessages in images, allowing to identify the image file, the contents of a suspect a hidden message, in the absence of a priori information about the presence in the stego file and the law of its incorporation, and modify images with a further possible exception of the extraction stegomessages.
Infokommunikacionnye tehnologii. 2012;10(3):93-97
93-97
USING NEURAL NETWORKS FOR CRYPTANALYSIS OF CIPHER «GRAPHICS ARRAY»
摘要
This article discusses the possibility of using neural networks for cryptanalytic cipher «Graphical matrix».
Infokommunikacionnye tehnologii. 2012;10(3):98-102
98-102
DECISION-MACING METHODS IN COINTROLLING STAFF OF A LARGE ORGANIZATION
摘要
This paper presents a new approach to the existence of perfect methods of decision making in management personnel Institute larger organization-support structure and to optimize the job responsibilities of staff, and manage the preparation and conduct of complex evaluation of his competency.
Infokommunikacionnye tehnologii. 2012;10(3):102-106
102-106
MUSEUM IN THE 21st CENTURY: INTEGRATION OF DIGITAL TECHNOLOGIES IN THE EXHIBITION SPASE
摘要
The article discusses the development of museum institution at the modern stage in the light of use the digital technologies in the museum exposition, the use of new multimedia tools.
Infokommunikacionnye tehnologii. 2012;10(3):106-110
106-110