Proceedings of Telecommunication Universities最新文献

筛选
英文 中文
Controller Location and Load Balancing Integrated Solution 控制器定位和负载均衡集成解决方案
Proceedings of Telecommunication Universities Pub Date : 2023-05-30 DOI: 10.31854/1813-324x-2023-9-2-81-93
A. Muthanna
{"title":"Controller Location and Load Balancing Integrated Solution","authors":"A. Muthanna","doi":"10.31854/1813-324x-2023-9-2-81-93","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-81-93","url":null,"abstract":"The usage of multi-controller SDNs is currently the most efficient approach for constructing the core of communication networks of the fifth and following generations. One of the top priorities in the study of this topic is occupied by the optimisation of the network core construction since it involves relatively high expenses when developing communication networks of the fifth and future generations. Due to the complexity of the problems being tackled, there are currently a number of load balancing algorithms and algorithms for arranging controllers in multicontroller networks that are based on meta-heuristic methods. These algorithms allow for the optimum possible utilisation of controller resources in such networks. However, a comprehensive solution to the load balancing and controller placement issues has yet to be discovered. The answer to such an issue is the focus of this article. The report suggests using network clustering in conjunction with the meta-heuristic chaotic salp swarm technique, which has  shown to be effective in prior research on the challenges of creating multi-controller networks, to accomplish this goal. The salp swarm algorithm in the paper is adjusted to take into account the integral solution to the problem of deploying controllers based on clustering of a multi-controller network and load balancing. By contrasting the simulation results with those from the well-known meta-heuristic particle swarm algorithms optimization and the grey wolf GWO, as well as the previous version of the chaotic salp swarm algorithm CSSA, the effectiveness of the proposed solution was evaluated.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114987168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Model of the Unbalanced Monopole Feed. Part 2. Determination of Complex Capacitance of Normally Open Wire Antennas, Small with Respect to the Wavelength 不平衡单极进给的数学模型。第2部分。相对波长小的常开线天线复电容的测定
Proceedings of Telecommunication Universities Pub Date : 2023-05-28 DOI: 10.31854/1813-324x-2023-9-2-6-21
O. Popov, A. Tumashov, G. Borisov, K. Korovin
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 2. Determination of Complex Capacitance of Normally Open Wire Antennas, Small with Respect to the Wavelength","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-2-6-21","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-6-21","url":null,"abstract":"A method for calculating the complex capacitance of small with respect to the wavelength, normally open antennas is proposed. Analytical expressions for determination of mutual potential coefficient of any two arbitrarily arranged linear conductors are obtained. The proposed technique can be useful in assessing the losses of normally open wire antennas placed in close proximity to the semiconductor surface, as well as in determination of their input resistance.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115211124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prototype of High-Speed Data Transmission Receiving and Transmitting Equipment in the 57‒64 GHz Frequency Range 57 - 64ghz频率范围内高速数据传输收发设备样机
Proceedings of Telecommunication Universities Pub Date : 2023-05-28 DOI: 10.31854/1813-324x-2023-9-2-23-39
O. Bolkhovskaya, G. Ermolaev, S. Trushkov, A. Maltsev
{"title":"Prototype of High-Speed Data Transmission Receiving and Transmitting Equipment in the 57‒64 GHz Frequency Range","authors":"O. Bolkhovskaya, G. Ermolaev, S. Trushkov, A. Maltsev","doi":"10.31854/1813-324x-2023-9-2-23-39","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-2-23-39","url":null,"abstract":"The purpose of this work is to create and study the characteristics of a prototype of receiving and transmitting equipment operating in the millimeter wavelength range in high-speed data transmission networks. During the work, the task of developing and software implementation of digital signal processing algorithms was solved, the hardware part was developed and implemented, experimental measurements of characteristics and field tests of the prototype were carried out. Experimental studies have shown that the developed equipment transmits and receives signals in the frequency range 57‒64 GHz with the possibility of discrete change of the signal frequency bandwidth: 100, 200, 400, 800 MHz and supports 12 modulation and coding schemes with low-density parity check code. The use of an adaptive algorithm for demodulation and decoding at the receiver made it possible to increase the efficiency of signal transmission and reduce the probability of packet errors by half. The developed prototype provides a data transmission rate of 2 Gbit/s at distances up to 100 m and of 500 Mbit/s at distances up to 300 m.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"601 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132656275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Properties of Malicious Social Bots 恶意社交机器人的属性
Proceedings of Telecommunication Universities Pub Date : 2023-03-13 DOI: 10.31854/1813-324x-2023-9-1-94-104
M. Kolomeets, A. Chechulin
{"title":"Properties of Malicious Social Bots","authors":"M. Kolomeets, A. Chechulin","doi":"10.31854/1813-324x-2023-9-1-94-104","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-94-104","url":null,"abstract":"The paper considers the ability to describe malicious bots using their characteristics, which can be the basis for building models for recognising bot parameters and qualitatively analysing attack characteristics in social networks. The following metrics are proposed using the characteristics of VKontakte social network bots as an example: trust, survivability, price, seller type, speed, and expert quality. To extract these metrics, an approach is proposed that is based on the methods of test purchases and the Turing test. The main advantage of this approach is that it proposes to extract features from the data obtained experimentally, thereby obtaining a more reasonable estimation than the expert approach. Also, an experiment on extracting metrics from malicious bots of the VKontakte social network using the proposed approach is described, and an analysis of the metrics' dependence is carried out. The experiment demonstrates the possibility of metrics extracting and analysis. In general, the proposed metrics and the approach to their extraction can become the basis for the transition from binary attack detection in social networks to a qualitative description of the attacker and his capabilities, as well as an analysis of the evolution of bots.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125921127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks 基于微控制器的网络物理攻击保护系统设计的层次模型
Proceedings of Telecommunication Universities Pub Date : 2023-03-13 DOI: 10.31854/1813-324x-2023-9-1-105-115
D. Levshun
{"title":"Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks","authors":"D. Levshun","doi":"10.31854/1813-324x-2023-9-1-105-115","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-105-115","url":null,"abstract":"The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includes models of hardware, software and hardware-software elements, interfaces, protocols and links between system elements, models of attacker and attack actions. The key difference of the developed model lies in the possibility of full representation of microcontroller-based systems, while other solutions have a drawback of designing such systems without taking into account the interactions of their devices with each other and other systems. In addition, the developed model is modular and extensible, aims to ensure the security of the designed solution from cyber-physical attacks, and considers security elements as an integral part of the final solution.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132850938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme 基于漏洞表示演化的程序建模。第1部分。生命周期计划
Proceedings of Telecommunication Universities Pub Date : 2023-03-13 DOI: 10.31854/1813-324x-2023-9-1-75-93
K. Izrailov
{"title":"Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme","authors":"K. Izrailov","doi":"10.31854/1813-324x-2023-9-1-75-93","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-75-93","url":null,"abstract":"The investigation results of the creating programs process and the resulting vulnerabilities are presented. The first part of the articles series offers a life cycle graphical scheme of the representations (namely, the following: Idea, Conceptual model, Architecture, 2D block diagram, Function diagram, Flowchart, Structogram, Pseudo-code, Classical code, Generation metacode, Script code, Assembly code, Abstract Syntax Tree, Machine Code, Bytecode) through which any sample program passes. The main properties of such representations are indicated - the purpose, form and content, obtaining and restoring representations methods, as well as possible vulnerabilities and ways to detect them. A vulnerabilities nested classification is introduced, consisting of their division according to the structural level in the program, the change in the content of the functionality and the impact on the information being processed.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Experience Quality Parameters of Cloud Video Conferencing Systems under Interference Conditions 干扰条件下云视频会议系统体验质量参数分析
Proceedings of Telecommunication Universities Pub Date : 2023-03-10 DOI: 10.31854/1813-324x-2023-9-1-59-73
R. Kirichek, A. Berezkin, D. Kukunin, A. Kolesnikov
{"title":"Analysis of Experience Quality Parameters of Cloud Video Conferencing Systems under Interference Conditions","authors":"R. Kirichek, A. Berezkin, D. Kukunin, A. Kolesnikov","doi":"10.31854/1813-324x-2023-9-1-59-73","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-59-73","url":null,"abstract":"The article deals with the testing of popular domestic and foreign cloud videoconferencing systems. A methodology for testing and comparing qualitative parameters of videoconferencing applications based on international experience is proposed. Assessment and comparison of videoconferencing services is based on the calculation of Hurst data flows, formed by the investigated cloud videoconferencing systems. Various applications of foreign and domestic videoconferencing systems have been tested in different operation modes with different channel quality parameters.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131558747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct Sequence Spread Spectrum Signal’s Demodulator Acquisition Implementation Based on Fast Fourier Transform. Part 2. Carrier Frequency Estimation 基于快速傅立叶变换的直接序列扩频信号解调采集实现。第2部分。载波频率估计
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-35-40
E. Brusin
{"title":"Direct Sequence Spread Spectrum Signal’s Demodulator Acquisition Implementation Based on Fast Fourier Transform. Part 2. Carrier Frequency Estimation","authors":"E. Brusin","doi":"10.31854/1813-324x-2023-9-1-35-40","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-35-40","url":null,"abstract":"Signals with direct spread spectrum are widespread in modern communication and navigation systems. Often for communication channels in which such signals are used, significant changes in the carrier frequency in relation to the information speeds of the received signals are characteristic. In particular, for communication channels with significant Doppler shift. Therefore, estimation of the carrier frequency plays a key role in solving the problem of initial synchronization of demodulators of signals with direct spectral broadening. In the first part of the paper, the main approaches to solving the initial synchronization problem were presented. In this part of the paper an algorithm for estimating the carrier frequency based on the analysis of the received signal uncertainty function cross section in the delay plane was proposed. The carrier frequency estimation is based on the fast Fourier transform using an iterative dichotomous search procedure. The results of its efficiency analysis are presented; the variance of the estimates obtained in the implementation of the proposed estimation algorithm are compared with the Cramer-Rao boundary.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127731668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Justification of the Empirical Expression for Assessing the Noise Immunity of Quadrature Modulation Signals 正交调制信号抗扰度经验表达式的论证
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-6-13
S. Dvornikov
{"title":"Justification of the Empirical Expression for Assessing the Noise Immunity of Quadrature Modulation Signals","authors":"S. Dvornikov","doi":"10.31854/1813-324x-2023-9-1-6-13","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-6-13","url":null,"abstract":"An approach to the substantiation of the empirical formula for calculating the bit error probability of quadrature modulation signals in terms of the average signal energy and the minimum Euclidean distance is considered. An analytical description of quadrature synthesis signals in the time and frequency continuum is presented. An approach to assessing the noise immunity of quadrature modulation signals from the standpoint of the indicator of the average signal energy and the Euclidean distance is considered. The equivalence of various well-known approaches to the analytical calculation of the bit error probability is shown. Graphic materials are presented, as well as simulation results. Empirically substantiated is a universal expression for assessing the noise immunity of receiving quadrature modulation signals, based on the differences in the average energy value and the value of the minimum Euclidean distance. Its generality with known expressions is shown.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126603493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Model of the Unbalanced Monopole Feed. Part 1. General Approach to Building a Mathematical Model 不平衡单极进给的数学模型。第1部分。建立数学模型的一般方法
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-24-33
O. Popov, A. Tumashov, G. Borisov, K. Korovin
{"title":"Mathematical Model of the Unbalanced Monopole Feed. Part 1. General Approach to Building a Mathematical Model","authors":"O. Popov, A. Tumashov, G. Borisov, K. Korovin","doi":"10.31854/1813-324x-2023-9-1-24-33","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-24-33","url":null,"abstract":"The paper proposes a method for separate calculation of the reactive component of the input impedance, radiation resistance and loss resistance small, in comparison with the wavelength of normally open antennas. A detailed equivalent circuit of of the Unbalanced Monopole with Shunt Feed (UMSF). Integral relations are obtained that determine the radiation resistance and the electromotive force of an equivalent generator. The decomposition of the active part of the input resistance into two components, one of which characterizes the radiated power, and the other - thermal losses, allows us to successfully solve both the problem of determining the resistance matching coefficient and the antenna efficiency. The results obtained can be useful in the design of antennas and energy calculations of radio links.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121726504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信