{"title":"A Review of User Identification Methods Based on Digital Fingerprint","authors":"A. Osin, Y. Murashko","doi":"10.31854/1813-324x-2023-9-5-91-111","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-91-111","url":null,"abstract":"Methods of user identification based on digital fingerprints are considered. The main approaches for the browser fingerprints creation which is installed on the user's device and characterizes the device belonging to the user are presented. The methods used to identify a person (user) during the operation of the device are also described. Methods using both the dynamics of keystrokes and interactions with the touch screen, voice and geolocation data, as well as behavioral biometrics and behavioral profile are presented. The concept of continuous authentication is described as a development of the identification approach. A list of publicly available data sets mentioned in the studies reviewed in the review is provided, with links to download them.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for Machine Code Reverse Engineering. Part 1. Preparation of the Research Object","authors":"K. Izrailov","doi":"10.31854/1813-324x-2023-9-5-79-90","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-79-90","url":null,"abstract":"The results of creating a unified methodology for reverse engineering the devices machine code are presented. The first part of the series of articles reviews scientific publications in this subject area. In the absence of satisfactory solutions, the author's process methodology is proposed, consisting of the following 4 stages: preparatory activities, static research, dynamic research and documentation. A detailed description of the steps of the first stage is provided, as well as examples of their application in practice using standard software. The scheme of the proposed methodology is presented in graphical form, and the steps given are formally written. The next part of the series of articles will describe the steps of the remaining stages and their systematization in tabular form, indicating the input and output objects, as well as the form of steps execution.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"62 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development and Research of a System for Automatic Recognition of the Digits Yemeni Dialect of Arabic Speech Using Neural Networks","authors":"N.H. Radan, K. Sidorov","doi":"10.31854/1813-324x-2023-9-5-35-42","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-5-35-42","url":null,"abstract":"The article describes the results of research on the development and testing of an automatic speech recognition system (SAR) in Arabic numerals using artificial neural networks. Sound recordings (speech signals) of the Arabic Yemeni dialect recorded in the Republic of Yemen were used for the research. SAR is an isolated system of recognition of whole words, it is implemented in two modes: \"speaker-dependent system\" (the same speakers are used for training and testing the system) and \"speaker-independent system\" (the speakers used for training the system differ from those used for testing it). In the process of speech recognition, the speech signal is cleared of noise using filters, then the signal is pre-localized, processed and analyzed by the Hamming window (a time alignment algorithm is used to compensate for differences in pronunciation). Informative features are extracted from the speech signal using mel-frequency cepstral coefficients. The developed SAR provides high accuracy of the recognition of Arabic numerals of the Yemeni dialect – 96.2 % (for a speaker-dependent system) and 98.8 % (for a speaker-independent system).","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"EMC-26 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model for Integrating Edge Computing into an Air-Ground Network Structure and Offloading Traffic Method for High and Ultra-High Densities Internet of Things Networks","authors":"A. Muthanna","doi":"10.31854/1813-324x-2023-9-3-42-59","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-42-59","url":null,"abstract":"The scientific challenge of incorporating edge computing into the air-ground network architecture for high and ultra-high density Internet of Things networks is the focus of this article. These issues are particularly important right now because of the concept of \"space‒air‒ground‒sea\" inegrated networks. A mechanism for offloading traffic from the ground network to mobile edge computing servers on UAVs has also been devised. This network model suggests using mobile edge computing servers deployed on unmanned aerial vehicles (UAVs) to reduce latency and power consumption. At the same time, a software profiler is utilized on the terminal devices to identify the difficulty of the computed task and, based on that determination, a three-level technique for offloading traffic is used.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an Accessibility Testing System for the Virtual Machine Deployment Service in the Cloud","authors":"A. Marchenko, D. Shchemelinin","doi":"10.31854/1813-324x-2023-9-3-68-73","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-68-73","url":null,"abstract":"This paper presents a developed system for testing the accessibility of the virtual machine deployment service in the cloud. The methods used for monitoring cloud systems based on open-source solutions such as Kubernetes, Prometheus, and Selenium are discussed. The key stages of the system design are described, including requirements gathering and analysis, architecture, and implementation features. This system allows for the prevention of potential issues before they arise, as well as increasing IT service reliability. Integration with open-source systems helps to reduce the cost of system development and operation and speeds up implementation time. Additionally, this system can be quickly adapted and customized to meet specific needs. To analyze the feasibility of building the system, production statistics of virtual machine reservations were collected using the Prometheus monitoring system.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"195 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124348751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Method for Time Characteristics Calculating in the Service Platforms of Infocommunication Transactional Services with Parallel Requests Processing","authors":"N. Redrugina","doi":"10.31854/1813-324x-2023-9-3-82-90","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-82-90","url":null,"abstract":"This paper addresses the problem of combining loosely coupled services into a single workflow and investigates methods for calculating its time characteristics. The goal of the study is to provide quality control over service quality and to identify bottlenecks in the information system. In addition to the analysis of request service processes in chains of local transactions, the possibility of introducing mass service tools, such as paralleling service by Fork-Join system, which can increase the efficiency of service and improve the performance of the system is considered. The paper considers the mathematical apparatus of Jackson networks, which is used to determine the time characteristics of the workflow of the transaction system as a network of mass service systems. The main result of the research is the development and presentation of a mathematical tool for determining the time characteristics of the workflow of a transactional system. The developed mathematical apparatus can be used to calculate the time characteristics of work processes in the developed and operated information systems, to ensure a high level of service quality.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Layer Cooperative Automatic Repeat Request Method for Data Streaming over UAVs Network","authors":"M. A. Lamri, A. Abilov, A. Presnetsov","doi":"10.31854/1813-324x-2023-9-3-28-41","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-28-41","url":null,"abstract":"In this article, an evaluation study was conducted on an Application Layer Cooperative Automatic Repeat ReQuest Algorithm ALC-ARQ designed for data streaming over a Wi-Fi Unmanned Aerial Vehicles standalone networks. A simulation model in NS-3 was implemented to investigate the performances of the method and conduct a comparative analysis with well-known routing protocols such like Ad hoc On Demand Distance Vector (AODV) and Optimized Link State Routing Protocol (OLSR) in terms of declaring link state information, rapidity of relaying and transmission range. The QoS metrics measured was Packet Loss Rate (PLR) and One-way Transmission Delay. Results show that the proposed method consistently outperform the classical routing protocols it terms of rapidity of relying and transmission range. In addition, the results show that the method maintains its stability it terms of packet recovery along the relay-node transmission range and keeps the QoS metrics under the permissible rates.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133036149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Model Network and an Analysis of Network Traffic for Controlling Robot Manipulators","authors":"L. Gorbacheva","doi":"10.31854/1813-324x-2023-9-3-75-81","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-75-81","url":null,"abstract":"The issue of controlling robotic manipulators remotely via a communication network is covered in the article. The built model network's structure is shown, and its key elements are detailed. It was designed to intercept and analyze network traffic generated during remote control of robotic manipulators. The main traits of the network traffic that was intercepted for four different applications of using a robot manipulator in the fundamental interaction scenario are presented. These traits also take into account the use of the author proposed improved network algorithm for controlling robot manipulators or their clusters. The self-similarity coefficient of the received network traffic was estimated.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"46 20","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114044043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Throughput Calculation for Microwave Link with Adaptive Modulation Under the Fading Conditions Inherent for Millimeter Waves","authors":"I. Stepanets","doi":"10.31854/1813-324x-2023-9-3-91-103","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-91-103","url":null,"abstract":"The article is devoted to the development of a method for calculating the capacity of microwave links with adaptive modulation under fading conditions in millimeter wave range. The relationship between throughput and unavailability coefficient of microwave links with different transmission rate levels are is shown for a known distribution function of fading. The results of data analysis of fading statistics at microwave links in the E-band range (71–76/81–86 GHz) and meteorological statistics are presented. The relationship of both statistics was revealed and taken into account in the proposed analytical equation for the distribution function of fading. A comparative analysis of the calculation results of the unavailability coefficient and throughput at microwave links in the E-band range was carried out based on the proposed distribution function as well as based on the distribution functions of existing methods. High relevance of the developed method to the measurement results is shown.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Methodology for Accounting the Influence of Parameters of a Spherical Underlying Surface with Finite Conductivity on VLF Antennas Characteristics","authors":"A. Tipikin, D. Potapov","doi":"10.31854/1813-324x-2023-9-3-60-66","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-3-60-66","url":null,"abstract":"The Earth's underlying surface has a significant impact on the characteristics of antennas and the energy parameters of the radio path. Although the theoretical aspects of the influence of the finite conductivity of the underlying surface on antennas have been sufficiently studied, there is a need for the development of a specific methodology that would allow to automize energy parameters calculations of radio paths using the wavehop method. This article presents a methodology for accounting for the electrical characteristics of the subsoil surface, which differs in its ability to use digital maps and automate calculations. It also includes separate calculation results for correcting antenna coefficients that confirm the theoretical calculations. The developed methodology can be used for calculations of energy parameters of radio paths using the wavehop method.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114516467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}