Vol 13, No 3 (2015)

Articles

Message modular interpretation for information protection systems

Kolyada A.A., Protasenia S.J., Chervyakov N.I.

Abstract

Fundamental principles of modular technology interpretation posts in information protection systems (IPS) are presented in the article. The computer arithmetic base of these technologies is the modular arithmetic (MA). In particular, given the mathematical formalization of the principle of the modular massages’ interpretation, as well as the necessary and sufficient conditions for its feasibility by a two-stage scheme of composition within the table-summatory computing MA-structure. The proposed technology allows to minimize difficulty and the execution time of the basic procedures of a position-modular IPS interface of this class. The coding and decoding algorithms that contain only logic and assignment operation are synthesized. In the traditional positional interpretation of data in IPS of modular type the forward and reverse code conversion takes time O (ns) modular operations each (n - length of position code of messages, and s- length of modular code of messages).
Infokommunikacionnye tehnologii. 2015;13(3):235-245
pages 235-245 views

METHOD FOR ANALYSIS OF MICROSTRIP ANTENNA BASED ON CHIRAL SUBSTRATE

Klyuev D.S., Neshcheret A.M., Osipov O.V.

Abstract

This work presents description of self-consistency method for solution interior electrodynamics problem concerned on distribution of current over surface of microstrip antenna based on chiral substrate. Requirements to physical model of microstrip antenna radiator were formulated. We represent derivation of elements of surface impedance matrix and elements of input admittance matrix for chiral layer where right-handed helixes were considered as conductor dopants. Singular integral equation with a Cauchy kernel for computing current dencity over microstrip antenna surface was obtained, and numerical solution of this equation is a well-set mathematical problem
Infokommunikacionnye tehnologii. 2015;13(3):245-252
pages 245-252 views

SIMULATION AND ANALYSIS OF GENERALIZED QUEUE SYSTEM WITH ARBITRARY DISTRIBUTION OF SYSTEM PARAMETERS

Buranova M.A., Kartashevskiy V.G., Kireeva N.V., Chupakhina L.R.

Abstract

In this work we analyzed multimedia application traffic structure. Processes of traffic network handling were simulated by software ns2 based on carried out analysis. Two special cases of generalized queue systems P 1/W/1 and P 2/P 3/1 were examined, and we researched correlation properties of time interval sequences of both packets and packet processing. According to obtained research results, it is able to produce theoretical analysis of G/G/1 systems by Lindley equation. We estimated delays for mentioned above two cases. Also we computed delay analytically by using mathematical apparatus of theory of queues based on Lindley equation solution by spectral method.
Infokommunikacionnye tehnologii. 2015;13(3):252-258
pages 252-258 views

EVALUATION OF SIGNAL ENERGY RELATION OF ONE-OFF MESSAGES AND CONTINUES INFORMATION DURING THEIR SIMULTANEOUS TRANSMISSION

Anfalov K.V.

Abstract

Transmission of one-off messages over busy telecommunication channels provides to equip by new features both installed analogue and IP-telephony systems. Maximal power of one-off messages should be estimated by taking into account telephone channel parameters and signal properties to minimize influence of one-off messages overlapping on the noise immunity of analogue and discrete data transmission systems. This work describes how to evaluate relation of energy characteristics of continues information and one-off messages transmitted over telecommunication channels. We carried out information analysis of voice signal components and noise immunity. Probability of data signal distortion due to impulse noise would be stay almost constant either with or without one-off messages, if one-off message power would be less data power, and error probability weakly depends on power of signal propagating over channel. Therefore condition h 2 > 9 should be provided to eliminate one-off message strong influence on validity of analogue and discrete data transmission for channels with low level fluctuation noise. Here parameter h 2 is power ratio of relevant data signal to one-off message signal. We propose to use broadband signal to improve one-off message selection. Permissible relations of power levels of continues information and one-off messages in the kind of voice signals were defined for their successful simultaneous transmission.
Infokommunikacionnye tehnologii. 2015;13(3):259-263
pages 259-263 views

QUALITY OF SERVICE CRITERION HIERARCHICAL SYSTEM FOR DATA TRANSMISSION NETWORK

Kostin A.A., Shaposhnikov D.E.

Abstract

We consider methodology for hierarchical multicriterion estimation of variants of data transmission network evolvement and operating. The paper is focused on system of aims and subtests for solution of rational choice problems of topology and network parameters during analysis, design and modification. Based on data transmission network operation we constructed three-level hierarchical system of indicators and numerical criterions of network performance and quality of service. Proposed system provides to take into account different approaches, which are defined by different decision making subjects. These approaches are concerned on formulating of operation aims and development of network structure. They are focused on creation of interactive tools for automate design systems, control and operation supporting of telecommunication networks during their lifetime.
Infokommunikacionnye tehnologii. 2015;13(3):263-269
pages 263-269 views

INFORMATION EXCHANGE OVER INDUSTRIAL NETWORK WITH DISCRETE SIGNAL INPUT/OUTPUT MODULES ADAM-4055

Kangin V.V., Lozhkin L.D.

Abstract

This work is concerned on problems of information exchange organization between the host computer and discrete signal remote and distributed input/output modules ADAM-4055 (Advantech Co., Ltd., Taiwan) over computer distributed control and data acquisition system. Here host computer and modules are joined by industrial network based on RS-485 interface by using ASCII or Modbus protocol. The problem of data input/output between host computer and ADAM-4000 modules based on industrial network is solved by command issuing by host and following receiving the response from addressable module. We considered command list used for operating with discrete signal input/output modules, analyzed their structure, and developed application providing any command input to ADAM-4055 module and response receiving and visualization.
Infokommunikacionnye tehnologii. 2015;13(3):269-276
pages 269-276 views

CORRELATIVE FEATURES OF QUEUE SIZE IN QUEUE SYSTEMS WITH GENERAL FLOWS

Likhtzinder B.Y.

Abstract

This work describes queue systems with request train flows being typical for modern multiservice networks. Influence of correlation features of flows on queue sizes is shown. Here the expression for correlation was derived. It generalizes a well known Pollaczek-Khinchin formula and it is correct for any stationary and ordinary request flows. Therefore average queue size is defined by dispersion and sum of correlative parameters of requests over service cycle. Flow parameters are easy determined by experiment. They can be used further for computing of average queue size in multiservice communication systems.
Infokommunikacionnye tehnologii. 2015;13(3):276-281
pages 276-281 views

DYNAMIC MODEL OF COMPLICATED DIVERSIFIED MANUFACTURING COMPLEX OPERATION UNDER TAKING INTO ACCOUNT CAPITAL STOCK AND REPRODUCTION RELATIONSHIPS

Dimov E.M., Ilyasov B.G., Makarova E.A., Eftonova T.A.

Abstract

We present developed model of diversified manufacturing complex operating as a part of macroeconomic system. Model involves main outline of circular of material and financial flows. It takes into account structural features of cross-sector relationships based on interindustry balance methodology. Model covers features of investment demand accumulating investment flows over entire macroeconomic system in the investment market. It also takes into account regulatory control of monetary management via money market and goods market under influence of market uncertainty effects. We produced business case experiments to research the influence of monetary policy actions on management of diversified manufacturing complex operation as a part of macroeconomic system. According to obtained results, money growth and interest rate reduction provide step up the rate of GDP under constraints due to effects of investment and liquidity traps. Business case approach application for research of diversified manufacturing complex operation dynamics based on simulation helps to reveal the cause-and-effect relationships and trends of diversified manufacturing complex development over set of unbalanced cases under undertrained conditions.
Infokommunikacionnye tehnologii. 2015;13(3):281-290
pages 281-290 views

FUNCTIONAL OF EXPECTED UTILITY: PRINCIPLES OF MODELING AND APPLICATION

Maslov O.N., Frolova M.A.

Abstract

This work is concerned on principles and futures of functional of expected utility application for management of organization-technical complex systems. Complex system management applies theory of decision-making, theory of knowledge, theory of risk and expected utility theories (both objective and subjective). We demonstrated advantages and disadvantages of objective and subjective approaches to simulation of functional of expected utility. Here we applied statistical simulation method according to earlier on developed Dimov-Maslov method and computational scheme based on Monte Carlo method to reduce influence of knowledge uncertainty. By using the functional of expected utility as a criterion of effectiveness of statistical simulation method modified by Dimov-Maslov method we improved the effectiveness of decision-making relating with complex system management.
Infokommunikacionnye tehnologii. 2015;13(3):291-297
pages 291-297 views

UWB pulse shape filter and antenna design for ETSI mask

Abdrakhmanova G.I., Grakhova E.P., Shmidt S.P., Kovacik T.

Abstract

A new pulse shape filter and a planar monopole antenna for satisfying the ETSI mask requirements on UWB communication systems radiation levels are designed in the paper. The microstrip filter on the basis of Chebyshev type of the 11 th order is designed in the way that can transform any UWB noise-like signal to the one, fitting the 6 ÷ 8,5 GHz band of the ETSI mask. The total filter size is 27×16 mm 2. The UWB planar antenna configuration was constructed on the basis of fractal technology, that allowed to provide impedance matching in the band 3,09÷15 GHz, while remaining the small dimensions (34×41 mm 2), which are inherent to UWB band. Both devices are made from the same material and can be easily implemented on one printed circuit board, that will reduce loss and increase the efficiency of ETSI mask matching and electromagnetic compatibility with the existing wireless devices.
Infokommunikacionnye tehnologii. 2015;13(3):297-305
pages 297-305 views

DETECTION OF VACANT UNOCCUPIED FREQUENCY SUB-BANDS BY COMPRESSED MEASUREMENTS

Parfenov V.I., Golovanov D.Y.

Abstract

This paper is focused on the problem of detection of vacant unoccupied frequency sub-bands over analyzed frequency band in the all-digital format, which is topical issue for the cognitive radio systems. We developed two detection algorithms: one is based on classical Bayesian procedure, another applies Compressive Sensing paradigm, and researched their accuracy dependence on signal-to-noise ratio and compression level. Application of developed algorithms provides great reduction of the number of operations performed by digital processor under negligible degeneration of accuracy of corresponding estimations. Both developed algorithms have close characteristics, which negligible depend on the number of detected occupied frequency channels.
Infokommunikacionnye tehnologii. 2015;13(3):305-312
pages 305-312 views

APPLICATION OF RECEIVING CIRCULAR ANTENNA ARRAYS FOR THE FIELD HF-BAND RADIO SYSTEMS BASED ON MIMO TECHNOLOGY

Ogloblin A.V.

Abstract

This work presents the main features of HF-band radio systems. Here generally MIMO technology is used for radio channel bandwidth enhancing. We propose to apply hybrid both spatial and polarization sub-channel spacing. The last one is realized by using three-orthogonal antenna elements forming a circular antenna array. We produced synthesis of eight-element circular antenna array and analyzed resulting model to define its electrodynamics properties. Results of numerical analysis are represented in the form of radiation patterns competed for vertical and horizontal sections over three HF-band frequencies. We produced analysis of capacity limits for MIMO 6x6 channel formed by proposed circular antenna array. According to obtained results, solutions based on circular antenna array provide channel bandwidth enhancing due to higher spatial selectivity and thereby improved signal-to-noise ratio.
Infokommunikacionnye tehnologii. 2015;13(3):312-318
pages 312-318 views

DIGITAL REJECTION FILTER BASED ON STAGGERED COUPLE OF SECOND ORDER SECTIONS

Ivanova V.G., Rezepova E.S.

Abstract

This work is concerned on properties of digital rejection filter based on staggered couple of second order sections. We derived approximate expressions for amplitude-frequency response of rejection filters based on single second order section and staggered couple of second order section and relations for these filters synthesis under taking into account required rejection frequency, rejection band and squareness ratio. We found that during increasing of squareness ratio the selectivity of staggered couples grows according to square law, while selectivity of simple filter is linear (under squareness ratio is more four). Here a well-known comparative evaluation for parameters of staggered couple biquadratic sections and parameters of rejection filter by the one second order section was estimated. Therefore, we found the gain of using of staggered couples in comparison to single-section filter unit improves under squareness ratio growing. We represent results of researches of rejection filter influence on the noise immunity of DBPSK demodulator under frequency concentrated in-band interference with spectral width less then signal spectral width more then one order.
Infokommunikacionnye tehnologii. 2015;13(3):318-324
pages 318-324 views

ABOUT THE METHOD FOR HIDDEN CODING OF CONTROL INFORMATION TO SPEECH DATA

Zhilyakov E.G., Pashintsev V.P., Belov S.P., Likholob P.G.

Abstract

Currently, the industry's creation of information, educational and entertainment content for audio information inquiries, movies and music are widely used spoken language. In this connection there is the problem of providing automatic control of the use of speech and in particular to prevent unauthorized actions with it. In many ways, this control is advantageously carried out in a secretive mode, where information about the processes of encoding and appropriate action available only to a specific group of persons. The authors have to solve this problem, we propose a method of adaptive hidden coding control information, providing for a given error probability of high secrecy. The method is to use the power properties of the voice data, the mathematical basis is used as an orthogonal basis of eigenvectors sub-band matrix instead of a pseudo-random sequence (PRS), which is widely used at present in the hidden coding control information. The studies found that the proposed method of sub-band projections has a higher level of secrecy of information control over the method of spreading since it causes less change in the proportion of the energy of speech segment data. Minimizing variations in energy band of the portion where the coding is not carried out, it is achieved through the use of sub-band projections found for sub-band matrix of eigenvectors whose eigenvalues are close to unity.
Infokommunikacionnye tehnologii. 2015;13(3):325-333
pages 325-333 views

DATA PROTECTION EDUCATIONAL MATERIAL REQUIREMENTS

Alekseev A.P., Makarov M.I., Orlov V.V.

Abstract

This article is devoted to data protection educational material requirements. Here we describe modern data protection principles, selection guideline for application-oriented programming language and mathematical system, the necessity of applying network analyzers and memory editors, and criterions to information security problems. Multi-layer information security consideration combines studying of cryptography and steganography algorithms. We propose to use the method for hidden distribution of information over set of telecommunication network channels, which provides to apply data protection original algorithm for each particular channel. According to multi-layer information security principles, distributed information is encrypted and it is hidden steganographically over different kinds of containers. Here algorithmic barrier is utilized as a complete linkage of protected data blocks. Moreover this information diffuses not only spatially but also in time. Also we describe a method for network steganography based on information hiding over length of network packet.
Infokommunikacionnye tehnologii. 2015;13(3):333-338
pages 333-338 views

USER ACCESS MANAGEMENT FOR UNIVERSITY CORPORATIVE AUTOMATED INFORMATION SYSTEM

Bolodurina I.P., Volkova T.V., Ashcheulova N.A.

Abstract

University automated information system is based on integration of data and advanced telecommunication infrastructure with great number of users (access subjects) with varied access rights to different data elements (access objects). Problem of minimization of information system user access privilege should be solved to provide effective corporate data protection. We present model of user access policy which joins restrictions of subject domain and capability access policy DBMS Oracle. Here restrictions of subject domain under permitted access are defined by user affiliation to hierarchy nodes that corresponds to university department organizing structure. Model provides flexible response to variation of user affiliation to nodes of university department hierarchy. It was implemented to Orenburg State University as a part of project "Orenburg State University Information Analysis System".
Infokommunikacionnye tehnologii. 2015;13(3):338-345
pages 338-345 views

COMPUTING OF ACCEPTANCE TOLERANCE FOR DYNAMIC OBJECT PARAMETERS

Ovsyannikov A.S., Burova M.A.

Abstract

We described method for computing of acceptance tolerance for dynamic objects via independent parameters and by taking into account the memory of control results. The first and second paragraphs are devoted to theoretical background and problem statement. The last paragraph illustrates computing of acceptance tolerance for object parameters under the following suppositions. Stationary, normal and random processes are considered as models of parameter varying in time with regards to dynamical object. Any process is observed during the every parameter variation, and it is considered as an additive mixture of true value and measurement error. Processes of parameter variation in time and measurement error are independent. Every measurements of parameters are saved in memory.
Infokommunikacionnye tehnologii. 2015;13(3):345-350
pages 345-350 views

LAB ENVIRONMENT FOR ANALYSIS OF X11 PROTOCOL

Kubaliyev Z.M., Ruzhnikov V.A.

Abstract

All GUI applications in UNIX environment require both graphic and data communication protocols, and these applications are interactive. That means if performance would be lower some threshold, users will mark them as unapplicable. Also there is a high performance threshold, when users will not be able to detect improvements under its growing. The problem of low performance network can be sold by graphic protocol compression. However this approach for the high performance networks does not work. For example, network transmits graphic command much faster then command is generated by application or faster then graphic server capabilities to receive and process them. Also there is a case, when application operates fast enough under current resources. Here user will miss all application improvements if application provides feedback at 100 ms, and compression would be inappropriate. However generally the network is a bottleneck, and both compute server and graphic sever have reserve cycles for graphic protocol compression. Graphic protocol is a machine language that provides for application program operating in the one computer to interact with graphics server operating in another computer. This work is devoted to problem of lab environment development for X11 graphic protocol analysis for research and following developing of method providing network traffic reducing between X-server and X-user.
Infokommunikacionnye tehnologii. 2015;13(3):350-354
pages 350-354 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies