T-Comm最新文献

筛选
英文 中文
INFLUENCE OF ATTACK INDICATOR RANKING ON THE QUALITY OF MACHINE LEARNING MODELS IN AGENT-BASED CONTINUOUS AUTHENTICATION SYSTEMS 基于agent的连续认证系统中攻击指标排序对机器学习模型质量的影响
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-8-45-55
S.G. FOMICHEVA
{"title":"INFLUENCE OF ATTACK INDICATOR RANKING ON THE QUALITY OF MACHINE LEARNING MODELS IN AGENT-BASED CONTINUOUS AUTHENTICATION SYSTEMS","authors":"S.G. FOMICHEVA","doi":"10.36724/2072-8735-2023-17-8-45-55","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-8-45-55","url":null,"abstract":"Security agents of authentication systems function in automatic mode and control the behavior of subjects, analyzing their dynamics using both traditional (statistical) methods and methods based on machine learning. The expansion of the cybersecurity fabric paradigm actualizes the improvement of adaptive explicable methods and machine learning models. Purpose: the purpose of the study was to assess the impact of ranking methods at compromise indicators, attacks indicators and other futures on the quality of detecting network traffic anomalies as part of the security fabric with continuous authentication. Probabilistic and explicable methods of binary classification were used, as well as nonlinear regressors based on decision trees. The results of the study showed that the methods of pre liminary ranking increase the F1-Score and functioning speed for supervised ML-models by an average of 7%. In unsupervised models, preliminary ranking does not significantly affect the training time, but increases the by 2-10%, which justifies their expediency in agent based systems of continuous authentication. Practical relevance: the models developed in the work substantiate the feasibility of mechanisms for preliminary ranking of compromise and attacks indicators, creating patterns prototypes of attack indicators in automatic mode. In general, uncontrolled models are not as accurate as controlled ones, which actualizes the improvement of either explicable uncontrolled approaches to detecting anomalies, or approaches based on methods with reinforcement.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFFICIENT CODE CHOICE BASE IN PRIMARY CODING 有效的编码选择基础
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-6-29-36
S.A. ADZHEMOV, A.P. VASILIEV
{"title":"EFFICIENT CODE CHOICE BASE IN PRIMARY CODING","authors":"S.A. ADZHEMOV, A.P. VASILIEV","doi":"10.36724/2072-8735-2023-17-6-29-36","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-6-29-36","url":null,"abstract":"Modern advances in microelectronics and the widespread use of computer technology for the purpose of software implementation of various telecommunication and information devices are a reliable justification for the representation of messages from various sources in digital form, that is, in the form of appropriate code combinations, which are essentially numbers in a certain number system. Considering the effective primary coding of messages from the source, they strive to achieve, first of all, the coding rate as close as possible to the entropy of the source, which was proved in the well-known theorems of Claude Shannon, which substantiated this position regarding the minimum value of the average length of the code combination. Since different messages from the source appear, as a rule, with different probabilities, it is possible to achieve the minimum coding rate using non-uniform coding methods, for example, according to the algorithm proposed by David Huffman. In an effort to achieve the minimum encoding rate, one should also take into account the complexity of the implementation of the primary encoding device, take into account the number of elements that will be required for its practical implementation, and so on. Based on this, the effectiveness of one or another method of primary coding is determined not by one, but by a number of factors that often contradict each other. One of these factors is the choice of the code base, which makes it possible to optimize the costs of the practical implementation of the primary coding method, which was the subject of consideration in this paper","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THREAT ANALYSIS AND SECURITY OF PERSONAL DATA USING USER DEVICES WITH EYE-TRACKERS 使用带有眼动追踪器的用户设备进行个人数据的威胁分析和安全
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-8-56-62
ILYA SAFONOV, MIKHAIL VYATKIN, OLESYA HIZHENKOVA, KSENIYA NEZHIVLEVA, IGOR VLASUYK
{"title":"THREAT ANALYSIS AND SECURITY OF PERSONAL DATA USING USER DEVICES WITH EYE-TRACKERS","authors":"ILYA SAFONOV, MIKHAIL VYATKIN, OLESYA HIZHENKOVA, KSENIYA NEZHIVLEVA, IGOR VLASUYK","doi":"10.36724/2072-8735-2023-17-8-56-62","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-8-56-62","url":null,"abstract":"Eye-tracking technology has been extensively used in web development, marketing, and gaming mechanics because of the ability to obtain data regarding the trajectory and gaze fixation points. Eye movement information may be effectively used to study complex cognitive processes and human visual perception. However, a significant issue of leaking user privacy has arisen with the expansion of eye-tracking technology. Since the technology can obtain highly sensitive information regarding user behavior and preferences, measures for protecting personal data are required. At the current stage of the development of technology, research on threats and means to ensure the security of personal data has become a high priority in this field. Proper diligence in the development and use of eye-tracking devices is becoming an integral part of the process. Potential threats associated with collecting, storing, and trans mitting information about users' gaze should be considered. Various methods have been proposed to ensure the security of personal data through the use of eye-tracking devices. The anonymization of data, which is the removal or replacement of personal identifying elements, appears to be among these. Transparency and user agreement to the collection and use of gaze data has also been an important aspect. This can be accomplished by explicitly providing information about the purpose of the data collection and the ability to control privacy. Threats related to the use of eye-tracking technology were considered, providing methods of ensuring the security of personal data. These are important steps in the development of the field to protect user privacy while improving the safety and ethics of using eye-tracking devices.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIMULATION OF COUNTERACTION TO COVERT INTERCEPTION OF AN INFORMATION SIGNAL OF AN UPSTREAM DATA STREAM IN A PASSIVE OPTICAL ACCESS NETWORK 无源光接入网中上游数据流信息信号隐蔽截获的反作用力模拟
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-7-29-37
I.I. SHESTAKOV, V.P. SHUVALOV
{"title":"SIMULATION OF COUNTERACTION TO COVERT INTERCEPTION OF AN INFORMATION SIGNAL OF AN UPSTREAM DATA STREAM IN A PASSIVE OPTICAL ACCESS NETWORK","authors":"I.I. SHESTAKOV, V.P. SHUVALOV","doi":"10.36724/2072-8735-2023-17-7-29-37","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-7-29-37","url":null,"abstract":"The article considers the simulation of countering the covert interception of confidential information transmitted in the upstream data stream of the passive optical access network of the point-to-multipoint architecture (P2MP PON-TDM). The secrecy of the intercep tion is due to the presence of back-reflected signals in the split connections of the backbone section of the fiber-optic communication line of the passive optical access network. To counteract this method of information interception, it is proposed to transmit an interference signal in the downward direction at a wavelength of 1310 nm. Evaluation of the effectiveness of this method is carried out by modeling in OptiSystem CAD. The result of the simulation are graphs of the dependence of the Q-factor on the inverse optical losses in the split connections and on the optical power level of the interference signal. Based on the analysis of graphs, the proposed method is considered effective provided that the level of optical power of the interference and information signal reflected from the split con nection of the main fiber optic cable on the subscribers' side is equal. To counteract, it is enough to apply one source of interference, the parameters of which are similar should be similar to the parameters of the upstream signal. Recommendations are also given to counteract the covert interception of upstream data in the P2MP PON-TDM optical access network.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF CALCULATION OF PARAMETERS OF ANTI-ALIASING FILTERS FOR CORRECTION OF SPECTRAL CHARACTERISTICS DEPENDING ON THE SAMPLING STRUCTURES USED IN COLOR FILTER ARRAYS 基于彩色滤光片阵列采样结构的光谱特性校正抗混叠滤波器参数的计算方法
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-5-4-13
S.G. ROMANOV, I.V. VLASUYK
{"title":"METHOD OF CALCULATION OF PARAMETERS OF ANTI-ALIASING FILTERS FOR CORRECTION OF SPECTRAL CHARACTERISTICS DEPENDING ON THE SAMPLING STRUCTURES USED IN COLOR FILTER ARRAYS","authors":"S.G. ROMANOV, I.V. VLASUYK","doi":"10.36724/2072-8735-2023-17-5-4-13","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-5-4-13","url":null,"abstract":"When developing algorithms and methods for generating and processing image signals (IS) used in devices based on single-matrix light-to-signal converters (LSC), the effects of not only the elements of the system included in the optical pathway (OP) located directly between the exposed image and device sensor, but also the specifics of the structure of color filter arrays (CFA) used in such cameras, applied to the surface of the matrix. In this article analyzed the most popular SSF subsampling structures and their impact on the spatial characteristics of the generated images. Based on the model for constructing these characteristics, a method is given for calculating the optimal parameters of anti-aliasing filters that match the properties of the OP and the sensor for a given characteristic of the optical system. Specific examples of calculating and optimizing such filters and evaluating their impact on the amplitude characteristics of signals are given. Based on the results of applying the developed method, formulated recommendations for the design of the CFA.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INVESTIGATION OF THE PARAMETERS OF THE FREQUENCY-TIME CONVERSION WINDOW DURING THE DECOMPOSITION OF THE SIGNAL RADIO PROFILE 研究了信号无线电剖面分解时的频时转换窗口参数
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-6-23-28
K.A. BOIKOV
{"title":"INVESTIGATION OF THE PARAMETERS OF THE FREQUENCY-TIME CONVERSION WINDOW DURING THE DECOMPOSITION OF THE SIGNAL RADIO PROFILE","authors":"K.A. BOIKOV","doi":"10.36724/2072-8735-2023-17-6-23-28","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-6-23-28","url":null,"abstract":"Known methods of time-frequency transformation, such as the Gabor-Ville transform, wavelet transform, are complex and cumbersome in calculations, require the correct selection of basic expansion functions, may have interference points and negative values of the spectral density function. The presence of space-time uncertainty inherent in any frequency-time decomposition, as well as the lack of the possibility of correcting the found expansion coefficients, make modern methods of frequency-time transformation ineffective in the analysis of signal radio profiles (SRP). Decomposition of SRP with windowed correlation feedback eliminates the above disadvantages by multiple enumeration of parameters, however, this occurs at the expense of a significant increase in the transformation time. The transformation window here is understood as a rectangular function that moves along the time axis from the origin. In this work, the window width is understood as the number of sampling points falling into the rectangular window function, which is equivalent to the length of the function along the time axis. The window step is the number of sampling points to which the rectangular window function (transformation window) moves in the time-frequency decomposition. The purpose of this work is to increase the efficiency of the frequency-time decomposition of the SRP by analyzing the parameters of the transformation window in decomposition with windowed correlation feedback. In the study, experimental research methods are used to register the electrical component of the electromagnetic field radiated by the product - SRP. Correlation analysis methods for determining the best match between the reference and reconstructed SRP. Methods of digital signal processing with frequency-time decomposition. The paper presents the registered SRPs and their parameters, a correlation analysis of the SRP data is carried out. The dependences of the correlation functions on the width and step of the window are given for a different number of sampling points of the registered SRP. The results obtained for the first time showed the possibility of using certain parameters of the transformation window to improve the accuracy and significantly reduce the time of SRP decomposition, which makes the work novel. It has been established that with a window width equal to half the length of the SRP itself and a window step of not more than a tenth of the length of the SRP, it is possible to achieve an increase in the cross-correlation between the original and restored SRP up to 0.95. Recommendations are given on the speed of recording equipment when receiving PDS (sampling rate below 10 GS/s). The practical significance of the work lies in the reduction of iterations of the multi-parameter approximation when using correlation feedback in the course of SRP decomposition, which significantly reduces the conversion time and improves its accuracy.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVALUATION OF THE S4 SCINTILLATIONS INDEX IN TRANSCONTINENTAL DECAMETER RADIO LINES 横贯大陆十米无线电线路s4闪烁指数的评价
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-5-14-24
V.P. SIVOKON
{"title":"EVALUATION OF THE S4 SCINTILLATIONS INDEX IN TRANSCONTINENTAL DECAMETER RADIO LINES","authors":"V.P. SIVOKON","doi":"10.36724/2072-8735-2023-17-5-14-24","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-5-14-24","url":null,"abstract":"On the HAARP and EISCAT heating stands, to solve a number of applied problems, studies are being carried out on the excitation of an interlayer ionospheric waveguide. The success of the implementation of these tasks depends on many factors, including the level of fading of the electromagnetic field in the waveguide, to assess the variations of which researchers use the scintillation index S4. The waveguide excitation model proposed by the experimenters is based on the perspective \"self-scattering effect\" on artificial magnetically oriented irregulars of the ionosphere. However, within the frame work of this approach, the possibility of the existence of other mechanisms of excitation of the waveguide and the influence of the geophysical environment on this process is not taken into account. To test this assumption, we use multi-position diagnostics based on SDR technology. Measurements on quasi-longitudinal and quasi-transverse paths with respect to the Earth's magnetic field line, as well as under different geophysical conditions, showed a significant difference in the variations of the scintillation index S4 and the intensity of the scattered wave. The results obtained can be used in the problems of optimizing schemes for pumping an information signal into an interlayer ionospheric waveguide.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODIFIED INVARIANT AMPLITUDE MODULATION WITH TWO REFERENCE SIGNALS 修正不变调幅与两个参考信号
T-Comm Pub Date : 2023-01-01 DOI: 10.36724/2072-8735-2023-17-6-13-22
I.I. PAVLOV, M.C. PAVLOVA, E.S. ABRAMOVA, S.S. ABRAMOV, .A. KHAN, YU.S. SHCHERBAKOV
{"title":"MODIFIED INVARIANT AMPLITUDE MODULATION WITH TWO REFERENCE SIGNALS","authors":"I.I. PAVLOV, M.C. PAVLOVA, E.S. ABRAMOVA, S.S. ABRAMOV, .A. KHAN, YU.S. SHCHERBAKOV","doi":"10.36724/2072-8735-2023-17-6-13-22","DOIUrl":"https://doi.org/10.36724/2072-8735-2023-17-6-13-22","url":null,"abstract":"The model of modified invariant amplitude modulation and demodulation with two reference signals considered in the article belongs to the field of systems, networks and devices of telecommunications and radio engineering and can be used in radio transmitting devices, telecommunication systems and devices where an amplitude-modulated transmitted signal is required for transmission through a communication channel. The achieved technical result of the modified invariant amplitude modulation and demodulation with two reference signals is aimed at the possibility of forming an amplitude-modulated transmitted signal with increased noise immunity characteristics to a specific type of interference. Algorithms of modified invariant amplitude modulation and demodulation with two reference signals are proposed, and based on these algorithms, block diagrams of a modified invariant amplitude modulator and a demodulator with two reference signals were developed. In order to obtain experimental data for the analysis of a modified invariant amplitude modulation and demodulation with two reference signals when it is affected by interference in the communication channel, the communication system was simulated and the necessary data calculated in Matlab. Additive white Gaussian noise was chosen as an interference in the communication channel. The article presents a simplified block diagram of the communication system of the experimental model. To compare the results, modified invariant amplitude modulation and demodulation with two reference signals will be used as a modulator and demodulator, in the first case, and in the second case, amplitude modulation and demodulation. As a result, estimates of the dependence of the standard deviation on the value of the signal-to noise ratio and the probability of a bit error on the value of the signal-to-noise ratio were obtained. The standard deviation for modified invariant amplitude modulation and demodulation with two reference signals has significantly lower values than the standard deviation for amplitude modulation and demodulation. The transmission of information with the same reliability through a communication channel with a modified invariant amplitude modulation with two reference signals requires a significantly higher signal-to-noise ratio than transmission through a communication channel with amplitude modulation.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135754111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE PROBLEM OF PROJECT MANAGEMENT AS A SOCIO-ECONOMIC SYSTEM 项目管理作为一个社会经济系统的问题
T-Comm Pub Date : 1900-01-01 DOI: 10.36724/2072-8735-2021-15-4-35-41
Artur I. Bannikov
{"title":"THE PROBLEM OF PROJECT MANAGEMENT AS A SOCIO-ECONOMIC SYSTEM","authors":"Artur I. Bannikov","doi":"10.36724/2072-8735-2021-15-4-35-41","DOIUrl":"https://doi.org/10.36724/2072-8735-2021-15-4-35-41","url":null,"abstract":"In the article, the author considers project management as a socio-economic system, which has characteristics that are different from other projects. The definition of project management and its essence as a socio-economic system are revealed. The main problems that arise in project management are highlighted, and solutions are proposed that will effectively implement this process. The article provides an overview of the role of educational programs in the development of the competence of professionals in the field of project management. The problems facing project management training and possible solutions are considered, and current trends in project management training are considered.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114651829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative algorithm for offset and scale estimation for 1d signals superposition with additive and multiplicative noise 具有加性和乘性噪声的一维信号叠加的偏移和尺度估计的迭代算法
T-Comm Pub Date : 1900-01-01 DOI: 10.36724/2072-8735-2021-15-12-24-30
R. Diyazitdinov
{"title":"Iterative algorithm for offset and scale estimation for 1d signals superposition with additive and multiplicative noise","authors":"R. Diyazitdinov","doi":"10.36724/2072-8735-2021-15-12-24-30","DOIUrl":"https://doi.org/10.36724/2072-8735-2021-15-12-24-30","url":null,"abstract":"We describe the algorithm for 1D signal superposition. The superposition is defined by offset and scale. Also the signals contain additive and multiplicative noise. We developed the iterative procedure for superposition of those signals. This procedure includes the separate estimation of offset and scale. The offset is estimated by signals in the Cartesian coordinate system. The scale is estimated by signals in the logarithm coordinate system. The iterative method is approximation to real value of superposition parameters. The parameters of the current iteration depend on the estimation of previous iteration. The error of the parameters estimation from additive gauss noise was by the numerical simulation. The developed algorithm compares with the brute force algorithm (the etalon algorithm). The compassion show that both algorithms are characterized the similar error of the parameters estimation, but developed algorithm is faster.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123263237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信