{"title":"New opportunities of the theft protection of the car","authors":"K. H. Lavrynets","doi":"10.31673/2518-7678.2020.032531","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.032531","url":null,"abstract":"This article is devoted to the issues related to the improvement of the movable property security systems of the citizens’ motor vehicles (cars) on the basis of the latest intelligent technologies of telecommunication systems. According to ITU recommendations, digital technologies of the future based on 4G / 5G are becoming more widespread. They are inherent in the rapid development of telecommunications in various fields, including the development of modern automotive security systems. The vehicle, as an object of protection, is a complex aggregate, which has the most modern mechanical, electronic and electronic-mechanical devices designed to protect it. These security devices can be classified as follows: the mechanical means (Mult-lock, Beer-lock, Construct and others); an electronic (car alarms, anti-theft devices, blockers of control circuits of the corresponding devices and units, etc.); an electronic-mechanical (Hood-lock, Construct, etc.).","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121365845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of MIMO integration methods with fifth generation technologies","authors":"Ye. Yu. Nikolayev","doi":"10.31673/2518-7678.2021.024653","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.024653","url":null,"abstract":"It is expected that with the general deployment of cellular 4G systems the new technologies would be required to satisfy the heightening demand for higher data transfer speeds and lower delays while retaining low deployment and maintenance costs. Multiple array technologies such as MIMO will play a key role in the forthcoming 5G and 6G systems. This paper will present several MIMO architectures and beamforming solutions for cm- and mm-wave 5G systems that work in the 20 (3-30 GHz) and 100 (30-300 GHz) spectrums. These spectrums provide much higher potential for small cell deployment with the use of large-scale antenna arrays due to the higher data capacity than that of the traditional cellular network systems. The mm-wave 5G ELA systems that will gradually replace LTE are going to have higher capacity with the use of Frequency Division Duplexing (FDD) because it enables the usage of uplink/downlink reciprocity in controlling the beamforming operation. It is, however, must be noted that MIMO technology has a key problem that consists of obtaining the necessary information needed to control the transmit and receive algorithms, the solution of which will be discussed in this paper. The array calibration errors that can cause severe performance losses are also going to be considered. The paper therefore will focus on the performance and implementation issues of different multi-user-MIMO (MU-MIMO) solutions for transmission in the cm- and mm-wave bands as well as key problems that follow the transmit MIMO processing for 5G systems. Performance evaluation of RF-based architecture and the traditional baseband transmission methodology for downlink MU-MIMO implementation as well as several transmission schemes to highlight the issues with MU-MIMO for 5G and the solutions to them will be provided.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126810976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brand management of an innovative product of a telecommunications company","authors":"O. Vynogradova","doi":"10.31673/2518-7678.2021.010511","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.010511","url":null,"abstract":"The role of the corporate branding in telecommunication market as positive attitude formation factor for innovative product within economic and sociopolitical destabilization, including variability of the competitive environment and high level of R&D activity is justified in article. Moreover, the industry characteristics of diversified products are taken into account. The place of the brand as a link between past, current and future marketing activities is interpreted, taken into account the relationship with consumers and the market reaction to the new product. The constant effort maintains of the customer loyalty is shown as obligatory activity by the telecommunication company, considering consumer awareness and change their spending power. The effective brand management for innovative products made by telecommunications companies should considered: industries characteristics; the competitiveness level among manufactured goods within telecommunication industry; companies investment opportunities for brand formation and development. The common types of interconnection between brand management strategy and innovative telecommunication products were expended. Moreover, the matrix related was built and interconnection types were characterized. The main goals of innovation brand management are justified considering the peculiarities of the telecommunication services market and the type of market environment in accordance with level of product and company novelty. Furthermore, the complex of marketing tools for each alternative was recommended which complement the telecommunication companies’ capabilities within Internet network. Depending on the market situation, it is advisable to apply the recommendations on effective brand management for innovative telecommunication products either inside the domestic market or to enter the foreign markets.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115636680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmission of track name information on the FM radio station using Radiotext","authors":"L. Dakova","doi":"10.31673/2518-7678.2020.031924","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.031924","url":null,"abstract":"The article develops a method of transmitting artist names and their tracks on FM radio using the additional function Radiotext in the radio data system (RDS), considers its principle of operation and scope, shows an example of basic software settings, received from the air information with the artist's name track. The main functions of the RDS system are considered.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experience in monitoring the educational activities of students","authors":"O. P. Besklinsʹka","doi":"10.31673/2518-7678.2021.017582","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.017582","url":null,"abstract":"Today, digital technologies allow creating and operated a virtual (online) platform that facilitates synchronous and asynchronous interaction with available resources between all parties to the learning process. In distance or blended learning, students independently organize, control, direct and regulate their activities. At the same time, monitoring, in particular by the teacher, plays a crucial role in creating internal feedback and, thus, in adopting appropriate rules. However, students may have unsatisfactory self-regulated learning outcomes due to poor monitoring. Therefore, external feedback between all actors involved in the various electronic learning management platforms is important. The article analyzes the possibilities of monitoring the educational activities of students in the study of disciplines in the system of higher education for technical and economic specialties. The main components of the study and the possibility of obtaining information about the activity and success of student learning in the learning management systems Moodle and Microsoft Teams are considered. A detailed description of obtaining information about the student's actions on the page of the discipline in the Moodle system using the blocks \"Action Reports\" and \"Monitoring\" are presented. Opportunities for monitoring all active student groups with which the teacher works, using the Insights tab and other Microsoft Teams applications are presented. The mechanisms of obtaining statistical information about the work of students during classroom and extracurricular work are described.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132311409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation of the possibility of building a Software-defined Wide Area Network SD-WAN based on Aruba equipment","authors":"M. P. Hnidenko","doi":"10.31673/2518-7678.2021.012735","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.012735","url":null,"abstract":"SD-WAN allows to centralize management of a distributed network infrastructure, as the entire network is provided by a controller that is located in the head office or in the cloud and supports the operation of branches (SD-Branch). SD-WAN is a technological transition to solutions that are more flexible, open and integrated with the cloud. SD-WAN solutions must provide a secure, service-provider-independent network with enterprise-class performance over a variety of WAN technologies. Building a software-defined WAN with Aruba hardware requires research to select the elements and ensure key characteristics are met. The SD-WAN controller can be Aruba Central, a powerful cloud solution for managing networks, switches, and branch controllers that includes built-in analytics tools that provide network and business process data for important decisions. The SD-WAN controller maintains connections to all SD-WAN Edge and SD-WAN Gateways to determine the operating status of SD-WAN paths over different WANs and restores quality of performance for each SD-WAN path. Aruba 9000, 7200, 7000 series mobility controllers and gateways can act as gateways for head offices and branches and support automatic configuration of IPsec tunnels and configuration of dynamic routing of head offices and branches. o build a branch network requires equipment, namely the appropriate set of access level switches and access points that Aruba has. The Aruba SD-Branch solution provides network access for employees, wireless Internet access for guests, and connectivity for IoT devices.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121766123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improvement of modern systems of workflow and document exchange in private enterprises with the help of cryptography and blockchain technology","authors":"V. O. Hulin","doi":"10.31673/2518-7678.2020.014045","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.014045","url":null,"abstract":"This article addresses the use of advanced encryption technologies in software development such as EDS, Mobile ID, and the use of blockchain technology for document sharing. It has been concluded that blockchain technology is a versatile way of storing and processing information in almost every field of activity, contributing to the formation of new crypto-institutions and crypto-industries. It is already clear that this technology and the changes it brings about are revolutionary and will lead to global change. This technology can give government agencies new tools to reduce fraud, reduce errors and reduce paperwork costs; great potential for creating new ways to secure property rights and to confirm the origin of goods and intellectual property. Technology influences the development and creation of services for the sale of certain services, creates specialized blockchain consortia that help in the study of technology and its introduction in the crypto industry.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122185610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The application of deep neural networks for the classification of the microstructure of cast iron products","authors":"M. Fesenko","doi":"10.31673/2518-7678.2021.026366","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.026366","url":null,"abstract":"The possibilities of using artificial neural networks in the tasks of recognizing the microstructure of cast irons have been investigated. Convolutional neural networks work on the basis of filters that are concerned with recognizing certain characteristics of an image (for example, straight lines). A filter is a collection of kernels; sometimes a single kernel is used in a filter. A kernel is a common matrix of numbers called weights that are \"trained\" in order to search for certain characteristics in images. The filter moves along the image and determines if some desired characteristic is present in a particular part of it. To obtain an answer of this kind, a convolution operation is performed, which is the sum of the products of the filter elements and the matrix of input signals. If some desired characteristic is present in the image fragment, the convolution operation will produce a number with a relatively large value at the output. If the characteristic is absent, the output number will be small. Note that the number of filter channels must match the number of channels in the original image; only then will the convolution operation produce the desired effect. For example, if the original image consists of three channels, the filter must also have three channels. The structure (architecture) of the convolutional neural network was proposed and its ability to recognize the presence of structural components of the microstructure of cast iron was confirmed. The training of the network was performed on images of microslices of various types of cast iron, and positive results were achieved with an accuracy close to 85%. The results of the work indicate the prospects of using convolutional neural networks in the tasks of recognizing and classifying the microstructure of cast iron.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of indicators of the effectiveness of complex signals of control channels of unmanned aircraft complexes","authors":"V. V. Vyshnivskyy","doi":"10.31673/2518-7678.2021.051521","DOIUrl":"https://doi.org/10.31673/2518-7678.2021.051521","url":null,"abstract":"The article discusses directions for improving the immunity of signals of control channels of unmanned aircraft complexes using complex signals. In order to implement the adaptation mode, it is proposed to use such devices for forming and processing signals of control channels that are rebuilt on command. This allows you to change: the parameters of a complex signal such as the base of a complex signal, the structure of the signal by pre-selecting it from the general ensemble, to perform a transition from one type of complex signal to another in accordance with the interference situation. These types of signal can be a discrete phase-manipulated signal, a discrete frequency-manipulated signal, i.e. with a pseudo-random frequency adjustment, or a combination thereof. It was determined that various types of complex signals have excellent capabilities in the fight against intentional jamming, which realize such properties as counteracting the suppression of the signal by jamming and concealment of its transmission to prevent parameter reconnaissance and eliminate the possibility of targeting jamming. To evaluate the effectiveness of complex signals, the selected indicator is the coefficient of suppression of interference by a complex signal based on the obtained analytical expressions for the values of the dispersion of the interference at the output of the correlation receiver after convolution of the complex signal. The second indicator of efficiency is the entropy hiddenness of a complex signal, which also varies for different types of signals. Such an indicator determines both energy and structural stealth, which significantly affects the time of exploration of the parameters of a complex signal. A conclusion was made about the expediency of using two parametric efficiency criteria, which comprehensively evaluates the main properties of a complex signal and allows to compare the types of signals for use in modems of the most effective control channels.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Next Generations of Optical Access Networks - NG-PON and NG-ЕPON","authors":"S. I. Tarbayev","doi":"10.31673/2518-7678.2020.031418","DOIUrl":"https://doi.org/10.31673/2518-7678.2020.031418","url":null,"abstract":"The work is devoted to an overview of the development of standards for telecommunication access networks based on new generation passive optical network (PON) technologies. PON systems are the # 1 cable broadband solution. International bodies are actively standardizing new options for PON technologies. PON technologies are standardized by two international organizations: ITU and IEEE. New standards of these organizations allow to significantly increase network bandwidth and expand the application area of PON technologies. Considered the latest ITU standardized technology, NG-PON2. The progress of work carried out by the IEEE on the standardization of new technologies, namely, 25G-EPON, 50G-EPON and Super-PON, is considered. The main difficulty in the implementation of new generation systems is noted.","PeriodicalId":171656,"journal":{"name":"Scientific Notes of the State University of Telecommunications","volume":"683 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}