Scientific Notes of the State University of Telecommunications最新文献

筛选
英文 中文
Assessment of the modern state of mobile communication market development in Ukraine 乌克兰现代移动通信市场发展状况评估
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.011519
O. S. Novik
{"title":"Assessment of the modern state of mobile communication market development in Ukraine","authors":"O. S. Novik","doi":"10.31673/2518-7678.2020.011519","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.011519","url":null,"abstract":"In today's economic environment, the decisive factor in accelerating economic growth is the development of the information space and, in particular, the telecommunications industry. It is the intensification of the processes of informatization of society that will lead to the transition to a new type of economic relations focused on the interests of people, where telecommunications, and in particular, mobile communication, play a major role. Sustainable development of information and telecommunication infrastructure is the most important prerequisite for enhancing the competitiveness of Ukraine's economy and integration into the global information society, enhancing human access to national and world information resources, improving living conditions and quality of life.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing QoS to High Performance Distributed Applications in Software-Defined Networks (SDNs) 为软件定义网络(sdn)中的高性能分布式应用提供QoS
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2021.023745
N. P. Hnidenko
{"title":"Providing QoS to High Performance Distributed Applications in Software-Defined Networks (SDNs)","authors":"N. P. Hnidenko","doi":"10.31673/2518-7678.2021.023745","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.023745","url":null,"abstract":"Nowadays, there is an ever-increasing number of applications that have strict quality of service (QoS) requirements. The ability to define QoS requirements in traditional networks is limited due to the complex control of these environments. Modification of the existing infrastructure has high administrative costs, since the subsystem of each service component must have its resources managed by a centralized organization to guarantee users the level of QoS that each of them requires. The specification of quality of service (QoS) requirements in traditional networks is limited by the high administrative cost of these environments. Nevertheless, newer network paradigms, as Software-Defined Networks (SDNs), simplify and relaxes the management of networks. In this sense, SDN can provide a simple/effective way to develop QoS provisioning. This approach allows the specification of classes of service and also negotiates the QoS requirements between applications and the SDN network controller. The SDN controller, in turn, monitors the network and adjusts its performance through resource reservation and traffic prioritization. Have developed a QoS provision architecture for high performance distributed applications exploiting the capabilities of SDN. In this architecture, simple software components enable a process of message exchanging that includes reservation request and reservation confirmation. This procedure allows a network controller to configure QoS queues to individual packet flows. The developed a proof-of-concept of proposal and experimental results show that the additional routines present low overhead, whereas – for a given test application — observes a reduction of up to 47% in transfer times. Despite the specific scenario evaluated, results indicate our solution feasibility. Future works include the development of renegotiation and adaptation functions.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123744861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and improvement of scenarios for the deployment of NTN networks NTN网络部署场景分析与改进
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2021.011218
O. S. Syvyk
{"title":"Analysis and improvement of scenarios for the deployment of NTN networks","authors":"O. S. Syvyk","doi":"10.31673/2518-7678.2021.011218","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.011218","url":null,"abstract":"The era of fifth-generation mobile or wireless networking technology has just begun, and it is this technology that can actually improve system performance to an extremely high level. Mobile communications from space are evolving rapidly. Non-terrestrial networks have the ability to provide reliable connections to areas that were previously difficult to connect, which has a high impact on the economic situation. A non-terrestrial network with 5G support can be an effective solution for providing services anywhere and anytime and expand the coverage area. This paper analyzes possible solutions for satellite systems and multi-beam data technologies due to their ability to increase bandwidth through frequency reuse, as well as increase data rates. To adapt 5G to support non-terrestrial, you need to consider and explore a holistic architecture or design that can cover many areas and users. The article analyzes and explores the main aspects of non-terrestrial networks, analyzes in detail the design possibilities, problems of implementation and construction, as well as areas of research. Fifth generation (5G) technologies and systems will meet the needs of users around the world anywhere, anytime. Extraterrestrial Network (NTN) systems are able to meet connection requests anywhere, offering a wide coverage area and ensuring continuity, availability and scalability of services. In this article, we will look at NTN's capabilities and its potential to meet the expectations of users on and off 5G networks. The current situation, current research and unresolved issues underscore the importance of NTN in the field of wireless communications.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment 用于检测电子计算机设备有害电磁辐射的新信息技术
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.042533
Yury Katkov
{"title":"New information technologies for detecting adverse compromising electromagnetic radiations from electronic computer equipment","authors":"Yury Katkov","doi":"10.31673/2518-7678.2020.042533","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.042533","url":null,"abstract":"The article deals with the problem of TEMPEST - unintentional radiation of electronic equipment, which can be intercepted by malefactors in the form of radiation of an electromagnetic parasitic wave, and which, from a security point of view, is compromising radiation because they can have compromising information. Today, the term TEMPEST is the name of a technology that includes various methods of analyzing electromagnetic compromising radiation in such a way that they can be used to recover intercepted data. The task was completed: It is known that electronic equipment creates electromagnetic fields that can interfere with radio and television reception at a considerable distance. But interference is not the only problem caused by stray electromagnetic radiation. In some cases, you can get information about the signals that are used inside the equipment, when the radiation signals are intercepted by intruders and these signals are decoded. This capability poses a problem, especially in the case of digital equipment, since remote signal recovery within the equipment can allow the reconstruction of the data that the equipment is processing. Therefore, the problem arises of determining technologies for detecting spurious electromagnetic radiation from electronic computers, which may have compromising information. The content of TEMPEST-technology is considered as a physical phenomenon of capturing and recovery of electromagnetic radiation emitted by digital equipment, and which can have compromising information. TEMPEST hardware analysis is performed, which includes various types of sensitive receivers that can monitor a wide range of frequencies, as well as a combination of hardware and software capable of processing the received signals. The analysis of various types of TEMPEST-technology is carried out, namely: Tempest-attack, Soft TEMPEST, as well as a variety of technologies for intercepting information by receiving spurious radiation of a monitor signal, searching for the necessary information on a disk, outputting information to an unused serial port; reflections of the luminous flux from the monitor screen on the walls; modeling the luminous flux in LED indicators and others. Recommendations for protection against TEMPEST technologies for companies and individuals are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134407568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the influence of the collision domain on the efficiency of the wireless communication 碰撞域对无线通信效率影响的研究
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.030513
M. P. Hnidenko
{"title":"Investigation of the influence of the collision domain on the efficiency of the wireless communication","authors":"M. P. Hnidenko","doi":"10.31673/2518-7678.2020.030513","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.030513","url":null,"abstract":"The data channel in the wireless network is essentially a collision domain of the 802.11 standard. In networks with a very high density of VHD subscribers, one of the best strategies to increase the total airtime is to achieve spatial reuse. Spatial reuse of a radio frequency resource is extremely difficult to achieve in practice in very high density zones due co-channel interference CCI and adjacent-channel interference ACI. To understand how to mitigate the effects of interference, the mechanisms by which they impair system performance should be explored. The investigation shows that there is a significant impact on reducing the performance of high-density wireless networks due to suboptimal radio frequency resource planning, which leads to an increase in the impact of co-channel interference CCI and adjacent-channel interference ACI as the number of subscribers increases. The transmissions rate can be reduced by increasing the number of clients to 100. At the same time, there is the potential to increase the performance of a high-density VHD wireless network through good frequency resource design and best configuration practices combined with cell size reduction to limit co-channel interference CCI and adjacent-channel interference ACI.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133159652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis software needed to ensure control over data packets in the software-configured networks 在软件配置的网络中,分析软件需要确保对数据包的控制
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.041624
A. Bereznyuk
{"title":"Analysis software needed to ensure control over data packets in the software-configured networks","authors":"A. Bereznyuk","doi":"10.31673/2518-7678.2020.041624","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.041624","url":null,"abstract":"The paper presents the concept of Software-Defined-Networking, and the history of programmable networks and associated review of the latest standards. One of them, the OpenFlow protocol, played an important role in promoting the concept of SDN, significantly influenced research and industry. Consider in more detail the basic principles of OpenFlow. To debug the software, it is necessary to ensure the control of packets in the network, although formally verification can be used to determine the correct flow. This is necessary in order to generate detailed network images and also to inspect function parameters under certain network conditions. From the standpoint of security, OpenFlow's potential for new security schemes has not been well understood. When analyzing packets in a Packet message on a network controller, it follows that they can be used to identify and detect the penetration of the connection before the stream is configured. While new attack vectors were investigated for network security, the centralized network controller and control channel remain partially unprotected.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"344 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124254300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of determining the parameters of objects management of telecommunication networks 电信网络对象管理参数的确定方法
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.010509
L. Berkman
{"title":"Methods of determining the parameters of objects management of telecommunication networks","authors":"L. Berkman","doi":"10.31673/2518-7678.2020.010509","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.010509","url":null,"abstract":"We consider the problem and methods for determining the parameters of objects management of telecommunication networks. Determined that in modern science and technology, as well as in telecommunications in particular are widely used mathematical models of processes under study. The basic problem of determining the parameters of facilities management, including in particular is the task of the operator stochastic object that describes the relations hip between random input and output variables. This full common carrier, for example, multivariate conditional probability density of the vector output when monitoring the input vector. However, the definition of conditional distribution laws require sophisticated experiment and large volume calculations. Therefore, solving practical problems using conventional torque characteristics: conditional mathematical expectations and correlation functions. On this basis, determine the best deterministic operator in terms of statistical criteria adopted approximating operator system is determined. It is shown that many features with parametric parameters defining managed object has a method of least squares using the theory of sensitivity and studied this method. This method can be applied to objects that based on prior information known structure equations describing their behavior and nominal values.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128831875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Drones Performance Assessment Tool in 4G Cellular Networks 4G蜂窝网络中的无线无人机性能评估工具
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2020.012834
I. V. Lyenkov
{"title":"Wireless Drones Performance Assessment Tool in 4G Cellular Networks","authors":"I. V. Lyenkov","doi":"10.31673/2518-7678.2020.012834","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.012834","url":null,"abstract":"A measurement tool for evaluating wireless drone performance on cellular networks is provided. Android software records various LTE settings, estimates TCP and UDP bandwidth, and tracks GPS location information. Examples of measurement results are given.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122246923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a site of car service services with the possibility of calling a tower according to geopositioning data 开发汽车服务站点,可根据地理定位数据呼叫信号塔
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/25187678.2022.025462
O. M. Shykula
{"title":"Development of a site of car service services with the possibility of calling a tower according to geopositioning data","authors":"O. M. Shykula","doi":"10.31673/25187678.2022.025462","DOIUrl":"https://doi.org/10.31673/25187678.2022.025462","url":null,"abstract":"The purpose of the work was to develop a website for the provision of car service services, which would combine all important services, provide an opportunity to have quick access to information and improve the work of the car service through feedback. As a result an introductory site for car service customers has been developed. The site consists of administrative and client parts. In this application, the client-car owner will be able to get all the information on the provision of services from the car service, their prices and call the tow truck. If necessary, the car owner has the opportunity to order a call back from a consultant, as well as call a tow truck. For the first time, a website was developed using geolocation technologies, with the help of which the car owner will be able to show his location to the car service operator. That is, such an application is of great practical importance, as it will help in emergencies on the roads in an unknown area. A car service operator's account has also been developed, which receives a callback from the request form, as well as information regarding the tow truck order and the customer's location. The operator has the ability to edit information about services and add new ones. Also, both parts have a blog page, which provides an opportunity to provide important information for customers, discuss the situation and exchange experiences. The software product was tested in the area using Google Maps, the testers made sure that the application works correctly and that the driver's location is displayed on the maps. The site is developed using HTML and CSS frontend layout technologies, Javascript, PHP and SQL technologies for backend development, geopositioning technologies.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"519 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116261053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the volatility of financial processes 对金融过程的波动性进行建模
Scientific Notes of the State University of Telecommunications Pub Date : 1900-01-01 DOI: 10.31673/2518-7678.2021.013642
A. D. Kozhukhivsʹkyy
{"title":"Modeling the volatility of financial processes","authors":"A. D. Kozhukhivsʹkyy","doi":"10.31673/2518-7678.2021.013642","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.013642","url":null,"abstract":"Tasks of risk management meet in all branches of practical activity of the person. Especially topical problems of mathematical modeling, estimation and forecasting of risks (which are characterized by the level of possible losses and their probability) is for the banking sector, insurance, investment companies. manufacturing enterprises operating in conditions of fierce competition and changing conditions, and for other types of activity. For the mathematical description of possible losses today there is a set of ideologically different approaches, which are based on classical statistical methods and methods of intelligent data analysis. Thus, to evaluate market and some other types of risks, various variants of the Value-at-Risk (VaR) technique are used, which makes it possible to obtain acceptable quality results for practical use.In the assessment of credit risks found the use of nonlinear models of classification type on the basis of logistical regression, linear regression, method of reference vectors (MOV), discriminatory analysis, fuzzy logic, neuro-fuzzy models, methods of Bayesian data analysis and decision tree, as well as combinations of these methods. To assess financial risks in insurance, the above-mentioned methods are used, as well as the theory of distributions of random variables, generalized linear models, regression analysis (linear and nonlinear models), Bayesian networks and other models and methods. The created computer system makes it possible to estimate the value of possible losses of VaR according to the methods of historical modeling and Monte Carlo. To solve this problem, you must first obtain estimates of the volatility forecasts of the relevant financial heteroscedatic processes. To calculate estimates of volatility forecasts, a model of generalized auto-aggression with conditional heteroscedasticity (UARUG or GARCH) is often used.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115165266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信