Proceedings of Telecommunication Universities最新文献

筛选
英文 中文
Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis 机器学习与软件漏洞检测:适用性分析和概念系统综合
Proceedings of Telecommunication Universities Pub Date : 2023-12-25 DOI: 10.31854/1813-324x-2023-9-6-83-94
N. Leonov, M. Buinevich
{"title":"Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis","authors":"N. Leonov, M. Buinevich","doi":"10.31854/1813-324x-2023-9-6-83-94","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-83-94","url":null,"abstract":"The article is devoted to the searching for vulnerabilities in software problem, as well as the possibilities of application of such a promising area in information technology as machine learning. For this purpose, a review of scientific publications in this area from Russian and foreign citation databases is made. A comparative analysis of the review's results was made according to the following criteria: publication year, application field, idea, solved problem of machine learning, degree of realization of its models and methods; for each criterion basic conclusions were drawn. As a result, 7 principles of building a new conceptual system of searching for vulnerabilities in software with the help of machine learning are proposed, the short meaning of which is as follows: program's multilateral study, combination of known methods, the use of machine learning in each method and algorithm of its management, the possibility of correcting the expert's work, storing information in a database and its synchronization with external, advisory nature of the found vulnerabilities; single software application usage. Based on the stated principles, a graphical scheme of such a system has been developed.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"20 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct Sequence Spread Spectrum Signal’s Parameters Estimation Bounds 直接序列扩频信号的参数估计边界
Proceedings of Telecommunication Universities Pub Date : 2023-12-24 DOI: 10.31854/1813-324x-2023-9-6-25-33
E. Brusin
{"title":"Direct Sequence Spread Spectrum Signal’s Parameters Estimation Bounds","authors":"E. Brusin","doi":"10.31854/1813-324x-2023-9-6-25-33","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-25-33","url":null,"abstract":"The article discusses the problems of direct spread spectrum signal’s parameters estimation and estimation performance analyzing. The achieved estimation variances compared with the corresponding Cramer ‒ Rao bounds as a rule. The proposed approach makes it possible to determine the bounds for signals of various types of modulation and spectral characteristics. The dependences of the Cramer ‒ Rao bounds on the signal-to-noise ratio, the spread spectrum sequence length and the duration of the observation interval are presented.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"643 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Model of the Unbalanced Monopole Feed. Part 3. Gain 不平衡单极馈电的数学模型。第 3 部分:增益增益
Proceedings of Telecommunication Universities Pub Date : 2023-12-24 DOI: 10.31854/1813-324x-2023-9-6-6-23
O. Popov, A. Tumashov, G. Borisov, K. Korovin
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 3. Gain","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-6-6-23","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-6-6-23","url":null,"abstract":"An integro-differential operator is specified that determines the longitudinal component of the electric field strength on the surface of the emitter conductor of an Unbalanced Monopole with Shunt Feed, created by the Base Current (BC). Analytical expressions are obtained that determine the parameters of an equivalent eight pole, which is the internal resistance of equivalent BC generators. The influence of the length of the counterweight conductors and the upper load of the high-voltage transformer on the efficiency and gain was studied.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"759 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates 纸质证书克隆攻击检测保护方法的实验研究
Proceedings of Telecommunication Universities Pub Date : 2023-11-15 DOI: 10.31854/1813-324x-2023-9-5-121-129
D. Flaksman
{"title":"Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates","authors":"D. Flaksman","doi":"10.31854/1813-324x-2023-9-5-121-129","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-121-129","url":null,"abstract":"A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"41 11-12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example Kitsune 数据集示例的物联网流量分形维度统计特征
Proceedings of Telecommunication Universities Pub Date : 2023-11-15 DOI: 10.31854/1813-324x-2023-9-5-112-119
O. Shelukhin, S. Rybakov
{"title":"IoT Traffic Fractal Dimension Statistical Characteristics on the Kitsune Dataset Example","authors":"O. Shelukhin, S. Rybakov","doi":"10.31854/1813-324x-2023-9-5-112-119","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-112-119","url":null,"abstract":"The paper considers a method for estimating the fractal properties of traffic, and also evaluates the statistical parameters of the fractal dimension of IoT traffic. An analysis of real traffic with attacks from the Kitsune dump and an analysis of the fractal properties of traffic in normal mode and under the influence of attacks such as SSDP Flood, Mirai, OS Scan showed that jumps in the fractal dimension of traffic when attacks occur can be used to create algorithms for detecting computer attacks in IoT networks. Studies have shown that in the case of online analysis of network traffic, when assessing the RF, preference should be given to the modified algorithm for estimating the Hurst exponent in a sliding analysis window.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139273994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Placement Algorithm of Base Stations Trunking Communication Systems 中继通信系统基站自动安置算法
Proceedings of Telecommunication Universities Pub Date : 2023-11-14 DOI: 10.31854/1813-324x-2023-9-5-25-34
V. Ivanov, S. Uvajsov, I. Ivanov
{"title":"Automatic Placement Algorithm of Base Stations Trunking Communication Systems","authors":"V. Ivanov, S. Uvajsov, I. Ivanov","doi":"10.31854/1813-324x-2023-9-5-25-34","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-25-34","url":null,"abstract":"to increase the efficiency of the trunking communication systems design process, an original algorithm for the automatic placement of base stations is proposed, taking into account the real conditions of radio wave propagation. The analysis showed that the existing methods allow you to place base stations manually, with a given step or automatically, but without taking into account the propagation of radio waves, which leads to poor-quality coverage of the required area with communication. The aim of the work is to reduce the complexity of designing a trunking communication system that is guaranteed to cover a given service area. It is proposed to calculate the service areas of base stations using a statistical model, as well as taking into account additional diffraction losses on the radio signal propagation path. The solution to the problem of automatic placement of base stations is based on the use of the proposed modified Hut model, which takes into account the terrain at the locations of the base and portable stations, as well as on the international recommendation for predicting signal propagation on a specific route for ground services. With automatic placement, the optimality criterion is fulfilled, which consists in placing the minimum number of base stations necessary to cover the required territory. An element of the novelty of the presented solution is that at the first stage of the calculation, the service area of the base station is determined by the statistical method, at the second stage, an updated calculation of the service area takes place taking into account the actual conditions of radio wave propagation at the binding site, and at the third stage, the zone of guaranteed customer service is determined. The use of the proposed algorithm makes it possible to reduce the complexity of the system design process and determine the sufficient number of base stations needed to cover a given area with communication. Appropriate software has been developed to apply the algorithm in real practice. To confirm the effectiveness of the algorithm, the paper presents comparative calculations of the time spent on designing a trunking communication system using the developed software and using the widely used RadioMobile program.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"64 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Serial Analog-Digital QAM Modems Based on Complex Band-Pass Filters with LF Butterworth Prototypes 基于低频巴特沃斯原型复杂带通滤波器的串行模拟数字 QAM 调制解调器
Proceedings of Telecommunication Universities Pub Date : 2023-11-14 DOI: 10.31854/1813-324x-2023-9-5-6-15
Y. Grebenko, R. Polyak, L.P. Yan
{"title":"Serial Analog-Digital QAM Modems Based on Complex Band-Pass Filters with LF Butterworth Prototypes","authors":"Y. Grebenko, R. Polyak, L.P. Yan","doi":"10.31854/1813-324x-2023-9-5-6-15","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-6-15","url":null,"abstract":"The article is devoted to the development and implementation of quadrature amplitude modulation algorithms based on an analog complex band-pass filter with Butterworth low-frequency prototypes. The use of complex Butterworth band pass filters makes it possible to obtain carrier signals with practically non-overlapping spectra. But the analog complex Butterworth filter has a non-linear phase-frequency response and, accordingly, the impulse responses of which are infinite and asymmetric. An overview of the development and implementation of a serial QAM modem based on an analog Butterworth complex band-pass filter and an inverse digital FIR filter. The procedure for obtaining the expression for the impulse response of analog complex band-pass Butterworth filters is considered. With the help of circuit simulation, the frequency response and impulse response of such a filter are determined. The choice of the center frequency is carried out by setting two coefficients. A block diagram of a serial data transmission system with quadrature amplitude modulation based on an analog complex Butterworth bandpass filter and an inverse digital FIR filter is proposed. The results of its circuit simulation in the Micro-Cap environment are presented.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Classification Model in Software-Defined Networks with Artificial Intelligence Elements 具有人工智能元素的软件定义网络流量分类模型
Proceedings of Telecommunication Universities Pub Date : 2023-11-14 DOI: 10.31854/1813-324x-2023-9-5-66-78
V. Elagin
{"title":"Traffic Classification Model in Software-Defined Networks with Artificial Intelligence Elements","authors":"V. Elagin","doi":"10.31854/1813-324x-2023-9-5-66-78","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-66-78","url":null,"abstract":"Application classification is essential to improve network performance. However, with the constant growth in the number of users and applications, as well as the scaling of networks, traditional classification methods cannot fully cope with the identification and classification of network applications with the required level of delay. The use of deep learning technology together with the architecture features of software-defined networks (SDN) will allow the implementation of a new hybrid deep neural network for application classification, which can provide high classification accuracy without manual selection and feature extraction. The proposed structure proposes a classification of applications, taking into account the logical centralized management on the SDN controller. The processed data is used to train a hybrid deep neural network consisting of stacked autoencoder with a high dimensionality of the hidden layer and an output layer based on softmax regression. The necessary network flow parameters can be obtained by processing traffic with a stacked auto-encoder instead of manual processing. The softmax regression layer is used as the final application classifier. The article presents simulation results that demonstrate the advantages of the proposed classification method in comparison with the support vector machine.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency Analysis of the Discontinuous Reception Scheme in 5G NR Communication Systems 5G NR 通信系统中不连续接收方案的能效分析
Proceedings of Telecommunication Universities Pub Date : 2023-11-14 DOI: 10.31854/1813-324x-2023-9-5-16-24
G. Ermolaev, O. Bolkhovskaya, A. Maltsev
{"title":"Energy Efficiency Analysis of the Discontinuous Reception Scheme in 5G NR Communication Systems","authors":"G. Ermolaev, O. Bolkhovskaya, A. Maltsev","doi":"10.31854/1813-324x-2023-9-5-16-24","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-16-24","url":null,"abstract":"The purpose of this work is to analyze the energy saving schemes of user equipment in the first releases (Release 15) of the fifth generation (5G NR) cellular mobile communication systems, as well as to identify possible ways to improve the energy efficiency of these systems. The paper describes the identified drawbacks of the existing discontinuous reception scheme (DRX-scheme) used for user equipment energy saving in 5G NR. The effectiveness of discontinuous reception scheme in reducing user equipment energy consumption was analyzed in detail by simulation study for various traffic models and a key scenario for the deployment of 5G wireless cellular mobile communication systems. Analysis of the simulation results shows that the discontinuous reception scheme does not reach the upper limit of possible energy saving for all the traffic models studied for a number of reasons described in this paper.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"2004 53","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139277880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Aware Beamforming in Millimeter-Wave Band Ultra-Dense Radio Access Networks. Part 2. Model of a Set of Radio Links 毫米波频段超密集无线接入网络中的位置感知波束成形。第 2 部分:一组无线电链路的模型一组无线电链路的模型
Proceedings of Telecommunication Universities Pub Date : 2023-11-14 DOI: 10.31854/1813-324x-2023-9-5-43-64
G. Fokin
{"title":"Location Aware Beamforming in Millimeter-Wave Band Ultra-Dense Radio Access Networks. Part 2. Model of a Set of Radio Links","authors":"G. Fokin","doi":"10.31854/1813-324x-2023-9-5-43-64","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-43-64","url":null,"abstract":"The second part of the study of beamforming issues, based on positioning in ultra-dense millimeter wave radio access networks, is devoted to the formalization and software implementation of a complex simulation model of the functioning of a set of directional radio links. Each directional radio link between a base station (gNodeB – gNB), equipped with an antenna array, and a user equipment (UE), operating in omnidirectional mode, is formed according to the location of the UE, known at the gNB. The set of gNB→UE directional radio links, simultaneously operating in a common frequency range, is studied as a set of traffic beams, that implement space division multiple access (SDMA). Spatial multiplexing is implemented through three-dimensional beamforming at the gNB and makes it possible to compensate for propagation losses and high levels of interference. In the first part of the study, it was shown that the problem of practical implementation of SDMA in ultra-dense radio access networks is a significant (tens of dB) spread in the signal to interference plus noise ratio (SINR), depending on the arrangement of two devices. The purpose of this study is to establish the dependence of SINR on 1) the beamwidth of the gNB sector in the direction of the user equipment in the radio link of the signal of interest (SOI); 2) uncertainty of the UE location; 3) interference from radio links of signal not of interest (SNOI): a) within its sector, b) other sectors of its cell and c) other cells in the network. The simulation model developed and implemented in software in this work for the first time made it possible to establish the interdependence of the UE positioning error factors and the required width of the traffic beam for its service. In particular, it was found, that as the positioning error decreases from 10 to 1 m, the required beam width in the horizontal and vertical planes narrows to 3 °, which makes it possible to increase the SINR to 25 dB. A simultaneous transmission multiplexing study showed that for 64 spatially multiplexed UEs, as the cell size increases from 20 to 300 m, the SINR increases by approximately 30 dB, subject to a beamwidth constraint of 3°. Unlike similar studies, in this model, the contribution from interference from simultaneously operating traffic beams within its sector, other sectors of its cell and other cells in the network is shown separately for the first time, which allows to differentiate the origin of interference and use scientifically based beamwidth control for their compensation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信