Proceedings of Telecommunication Universities最新文献

筛选
英文 中文
Multi-Criteria Evaluation of UAV Control Efficiency in Hybrid Communication Networks 混合通信网络中无人机控制效率的多标准评估
Proceedings of Telecommunication Universities Pub Date : 2024-02-28 DOI: 10.31854/1813-324x-2024-10-1-18-25
А. Berezkin, R. Vivchar, R. Kirichek
{"title":"Multi-Criteria Evaluation of UAV Control Efficiency in Hybrid Communication Networks","authors":"А. Berezkin, R. Vivchar, R. Kirichek","doi":"10.31854/1813-324x-2024-10-1-18-25","DOIUrl":"https://doi.org/10.31854/1813-324x-2024-10-1-18-25","url":null,"abstract":"Currently, there is an active growth in the use of unmanned systems in various spheres of activity. The qualitative fulfillment by unmanned systems of their target tasks depends on the efficiency of information exchange channels for their control, which consists of several criteria, which makes the problem of its evaluation a multi-criteria one. This article presents the corresponding evaluation methodology, which is based on the use of the probability of achieving a set of functioning goals as a generalized efficiency indicator. To determine the probability, the widely used Rosenblatt-Parzen nuclear estimation method is used. The main stages of the methodology are described and recommendations for its use in the framework of ensuring qualitative fulfillment by unmanned systems of their target tasks are offered.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"7 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140423247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Incoherent Reception Noise Immunity of Binary Signals with Differential Phase Manipulation in the Presence of Several Harmonic Interferences 存在数次谐波干扰时采用差分相位操纵的二进制信号的最佳不相干接收抗噪能力
Proceedings of Telecommunication Universities Pub Date : 2024-02-28 DOI: 10.31854/1813-324x-2024-10-1-65-72
A. Pitrin, A. Popov, S. Terechenko
{"title":"Optimal Incoherent Reception Noise Immunity of Binary Signals with Differential Phase Manipulation in the Presence of Several Harmonic Interferences","authors":"A. Pitrin, A. Popov, S. Terechenko","doi":"10.31854/1813-324x-2024-10-1-65-72","DOIUrl":"https://doi.org/10.31854/1813-324x-2024-10-1-65-72","url":null,"abstract":"This article proposes the calculation of the probabilities of incoherent reception of signals with binary relative phase manipulation (OFM–2) in the presence of several harmonic interference. Examples of calculating the error probability per bit of receiving signals from OFM – 2 according to the presented method in the presence of several harmonic interference are shown. The obtained graphs depend on the magnitude of the signal at different values of interference and the same magnitude of the frequency shift, as well as on the frequency shift of interference at different levels of signals and interference. The results of the study using this technique allow us to calculate with high accuracy and reliable forecasting the reliability of transmitted information in radio communication channels under the influence of several harmonic interference during processing on two clock cycles. And also to predict the maximum damage to the process of transmitting information in a radio communication channel under various conditions: the coincidence of interference frequencies with the signal frequency, the offset of interference frequencies relative to the signal frequency and the spread of interference frequencies with the signal frequency.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"107 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140423716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open Dataset for Testing of Visual SLAM Algorithms under Different Weather Conditions 用于测试不同天气条件下视觉 SLAM 算法的开放数据集
Proceedings of Telecommunication Universities Pub Date : 2024-02-28 DOI: 10.31854/1813-324x-2024-10-1-97-106
A. Podtikhov, A. Saveliev
{"title":"Open Dataset for Testing of Visual SLAM Algorithms under Different Weather Conditions","authors":"A. Podtikhov, A. Saveliev","doi":"10.31854/1813-324x-2024-10-1-97-106","DOIUrl":"https://doi.org/10.31854/1813-324x-2024-10-1-97-106","url":null,"abstract":"Existing datasets for testing SLAM algorithms in outdoor environments are not suitable for assessing the influence of weather conditions on localization accuracy. Obtaining a suitable dataset from the real world is difficult due to the long data collection period and the inability to exclude dynamic environmental factors. Artificially generated datasets make it possible to bypass the described limitations, but up to date, researchers have not identified testing SLAM algorithms under different weather conditions as a stand-alone task, despite the fact that it is one of the main aspects of the difference between outdoor and indoor environments. This work presents a new open dataset that consists of 36 sequences of robot movement in an urban environment or rough terrain, in the form of images from a stereo camera and the ground truth position of the robot, collected at a frequency of 30 Hz. Movement within one area occurs along a fixed route; the sequences are distinguished only by whether conditions, which can make it possible to correctly assess the influence of weather phenomena on the accuracy of localization.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"383 2‐3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140417203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synthesis of Antenna Array Radiation Pattern at Large Scanning Angles Using Genetic Algorithm 利用遗传算法合成大扫描角度下的天线阵列辐射模式
Proceedings of Telecommunication Universities Pub Date : 2024-02-28 DOI: 10.31854/1813-324x-2024-10-1-49-57
V. Dmitrieva, K. Korovin, A. Likontsev
{"title":"Synthesis of Antenna Array Radiation Pattern at Large Scanning Angles Using Genetic Algorithm","authors":"V. Dmitrieva, K. Korovin, A. Likontsev","doi":"10.31854/1813-324x-2024-10-1-49-57","DOIUrl":"https://doi.org/10.31854/1813-324x-2024-10-1-49-57","url":null,"abstract":"At present, in most modern communication systems, for example, in modern satellite terminals, the use of scanning beam antennas, i. e. antenna arrays is assumed. At the same time, at large scanning angles, the side lobe level (SLL) increases strongly and decrease in the gain is observed. In this regard, the problem of finding a procedure for synthesizing an amplitude-phase distribution (APD) with low SLL and high gain (G) at large scanning angles comes up. One of the ways to reduce SLL and compensate for the decrease in G is to synthesize the optimal APD (in terms of the maximum G and minimum SLL) using optimization algorithms. At the same time, taking into account the characteristics of the radiation pattern of the array emitters requires numerical electrodynamic calculation. The goal of this paper is to develop a procedure for the synthesis of APD with low SLL for linear and rectangular antenna arrays at various, including large, scanning angles and compensation for G reduction using a genetic algorithm and numerical electrodynamic calculation. The methods for studying the characteristics of antenna radiators are numerical electrodynamic modeling by the finite element method (FEM) in Ansys HFSS computer-aided design system and optimization of the APD  for a given radiation pattern(RP) by a random search method using partial diagrams of antenna elements. The novelty is the combination of accurate numerical electrodynamic calculation of the RP of antenna elements and optimization search for APD for the synthesis of the required RP using partial diagrams. As a result, a procedure for APD synthesis of linear and uniform rectangular equidistant (for example, 8- and 64-element) antenna arrays has been developed, taking into account the exact electrodynamic characteristics of antenna elements and their mutual resistance. Radiation patterns were obtained taking into account the effect of neighboring elements, with the help of which, using a genetic algorithm, APDs on emitters were found at different scanning angles. The change in SLL and G of the antenna array is analyzed at different scanning angles using different APDs. The proposed algorithm allows to synthesize APD for a RP with low SLL and high G at scanning angles up to 40° for linear antenna array and up to 80° in the case of a uniform rectangular antenna array. The results of this work are relevant in the problems of radiation pattern synthesis, since the proposed solution provides a significant gain in the radiation pattern synthesis rate of APD of linear and rectangular antenna arrays, especially for systems with a large number of antenna elements. At the same time, it is possible to maintain a high G at large scanning angles, and achieve a significant reduction of SLL.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"100 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140422761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Characteristics of Global Navigation Satellite System Consumer Equipment to Spoofing Attacks 全球导航卫星系统消费设备易受欺骗攻击的特点
Proceedings of Telecommunication Universities Pub Date : 2023-12-26 DOI: 10.31854/1813-324x-2023-9-6-95-100
V. Nerovny, P. Korataev, P. Oblov, M. Tolstykh
{"title":"Vulnerability Characteristics of Global Navigation Satellite System Consumer Equipment to Spoofing Attacks","authors":"V. Nerovny, P. Korataev, P. Oblov, M. Tolstykh","doi":"10.31854/1813-324x-2023-9-6-95-100","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-95-100","url":null,"abstract":"The article presents approaches to assessing the vulnerability of navigation equipment of global navigation satellite systems consumers to spoofing attacks, as well as technologies for protection against interference and spoofing. Approaches and tools are proposed for assessing the vulnerability of navigation equipment of global navigation satellite systems in the presence of simulated interference. The results obtained can be used by developers to create a new generation global navigation satellite systems with improved protection against spoofing.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"13 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139156996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Interface Model of User Interaction with a Query-Type Information Service 用户与查询型信息服务交互的高效界面模型
Proceedings of Telecommunication Universities Pub Date : 2023-12-26 DOI: 10.31854/1813-324x-2023-9-6-102-115
P. Kurta
{"title":"An Efficient Interface Model of User Interaction with a Query-Type Information Service","authors":"P. Kurta","doi":"10.31854/1813-324x-2023-9-6-102-115","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-102-115","url":null,"abstract":"The work solves the problem an analytical model constructing of the user interaction interface with an information system designed to provide information based on multi-parameter user requests. The model purpose is to evaluate the effectiveness of the interface and, accordingly, the interaction itself. To do this, using an example of typical work with an interface, the following prerequisites (as conditions) for modeling are introduced: the effectiveness of the interface, its forms and transitions between them, interface elements, the atomic efficiency of the element and form, the order of their arrangement and the empirical dependence of efficiency, as well as the formulation interface design tasks. Using these premises, an appropriate efficiency model has been formed, which allows us too analytically, based on the structure and parameters of the interface, evaluate its effectiveness, operativeness and resource efficiency. A software prototype was created, which was based on the model and with the help of which a number of experiments were carried out under three scenarios, consisting of changing the number of forms and interface elements in order to determine their impact on overall efficiency; the corresponding dependencies were obtained in the form of histograms. Conclusions are drawn regarding the accuracy of the model, its theoretical and practical significance, as well as the overall complexity of designing “ideal” interfaces.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139157314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic Accessibility of Starlink User Terminals 星链用户终端的电磁兼容性
Proceedings of Telecommunication Universities Pub Date : 2023-12-25 DOI: 10.31854/1813-324x-2023-9-6-34-41
S. Dvornikov
{"title":"Electromagnetic Accessibility of Starlink User Terminals","authors":"S. Dvornikov","doi":"10.31854/1813-324x-2023-9-6-34-41","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-34-41","url":null,"abstract":"The results of assessing the electromagnetic accessibility of radio emission sources of the Starlink satellite communication system are presented. The features of the organizational and technical structure of the system are considered. Its main technical capabilities for organizing the provision of telecommunications services to users of subscriber terminals are analyzed. The technical features of the infrastructure of the Starlink satellite communication system, which are essential for the electromagnetic accessibility of its sources, have been studied. The possibility of radio links for transmitting information content in the upstream and downstream channels of the Starlink satellite communication system was assessed. The main stages of the developed methodology for assessing the electromagnetic accessibility of sources are presented. Analytical expressions are given for calculating the probability of detection and attenuation of signals. The requirements for the sensitivity of the receiving equipment of monitoring equipment are substantiated. Dependences of the level of signal attenuation on the distance of control equipment were obtained.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"6 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposals for Universal Protocol Fuzzer Construction 构建通用协议模糊器的建议
Proceedings of Telecommunication Universities Pub Date : 2023-12-25 DOI: 10.31854/1813-324x-2023-9-6-59-67
D. Vasinev, M. Solovev
{"title":"Proposals for Universal Protocol Fuzzer Construction","authors":"D. Vasinev, M. Solovev","doi":"10.31854/1813-324x-2023-9-6-59-67","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-59-67","url":null,"abstract":"The article studies the problem of ensuring information security in the field of telecommunications using the phasing method. The analysis of modern software products designed for testing by the fuzzing method is carried out, their disadvantages are revealed, and an approach to the creation of a universal mutation protocol fuzzer is proposed. The method of test data formation allows to automate the process of searching for vulnerabilities in telecommunication protocols and pro-software. Its novelty lies in the formation of test constructs on the basis of parameters of fields of telecommunication protocols. The proposed fuzzy solution allows to form an attack vector on the basis of known parameters presented in the threat database, as well as to modify these attack vectors.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Traffic Identification Methods for Resource Management in SDN 分析用于 SDN 资源管理的流量识别方法
Proceedings of Telecommunication Universities Pub Date : 2023-12-25 DOI: 10.31854/1813-324x-2023-9-6-42-57
J. Dmitrieva, D. Okuneva, V. Elagin
{"title":"Analyzing Traffic Identification Methods for Resource Management in SDN","authors":"J. Dmitrieva, D. Okuneva, V. Elagin","doi":"10.31854/1813-324x-2023-9-6-42-57","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-42-57","url":null,"abstract":"The article is devoted to the analysis of traffic classification methods in SDN network. The review of analytical approaches of traffic identification to identify the solutions used in them, as well as assessing their applicability in the SDN network. Types of machine learning are considered and input parameters are analyzed. The methods of intelligent analysis covered in the scientific articles are systematized according to the following criteria: traffic identification parameters, neural network model, identification accuracy. Based on the analysis of the review results, the conclusion is made about the possibility of applying the considered solutions, as well as the need to form a scheme of SDN network with a module of artificial intelligence elements for load balancing.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"8 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation 机器代码逆向工程方法论。第 2 部分:静态调查静态调查
Proceedings of Telecommunication Universities Pub Date : 2023-12-25 DOI: 10.31854/1813-324x-2023-9-6-68-82
K. Izrailov
{"title":"Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation","authors":"K. Izrailov","doi":"10.31854/1813-324x-2023-9-6-68-82","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-68-82","url":null,"abstract":"The creating results a unified methodology for reverse engineering the machine code of devices are presented. This second part of the articles series is devoted to static research of code in order to restore its metainformation (source code, algorithms, architecture, conceptual model), as well as search for vulnerabilities in it. A scientific publications review on the topic of existing methods and tools for static analysis of machine code is carried out. A detailed description and formalization of the steps of the stage is given, as well as examples of their application in practice. A proposed methodology partial diagram is presented in graphical form, indicating the main and intermediate results obtained.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信