Proceedings of Telecommunication Universities最新文献

筛选
英文 中文
Effective Channel Planning of IEEE 802.11 Networks as a Plane Tessellation Problem. Part 3. Solutions of Best Channel Configuration Selection Problem for Eight-Channel Case 基于平面镶嵌问题的IEEE 802.11网络有效信道规划第3部分。八通道情况下最佳通道配置选择问题的解
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-41-51
A. Vikulov
{"title":"Effective Channel Planning of IEEE 802.11 Networks as a Plane Tessellation Problem. Part 3. Solutions of Best Channel Configuration Selection Problem for Eight-Channel Case","authors":"A. Vikulov","doi":"10.31854/1813-324x-2023-9-1-41-51","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-41-51","url":null,"abstract":"When solving the problem of channel planning of IEEE 802.11 wireless access networks, it is necessary to allocate channels for access points so that the selected channel configuration provides minimum negative mutual influence. We will consider the covering of the plane “tessellation”, i.e. the densest filling, by coverage areas of access points groups, which in the spectral sense correspond to channel clusters. By assigning a channel to each of the access points, we obtain a set of possible configurations, each of which corresponds to a possible solution of the channel planning problem. When solving actual design problems in the 5 GHz band, it is often necessary to take into account channel plans that include 8 or more channels. Based on the previously proposed model and method, in this paper, solutions to the problem of finding the best channel configuration for clusters consisting of 8 access points are obtained, and their characteristics are shown in relation to their geometry.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128717591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Analysis of the Mathematical Model of a Cluster V2X-System 集群v2x系统数学模型的数值分析
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-14-23
P. Plotnikov, A. Vladyko
{"title":"Numerical Analysis of the Mathematical Model of a Cluster V2X-System","authors":"P. Plotnikov, A. Vladyko","doi":"10.31854/1813-324x-2023-9-1-14-23","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-14-23","url":null,"abstract":"The article analyzes the results of numerical modeling of information processes in vehicular ad-hoc networks (VANETs). The review of works devoted to clustering and data caching schemes in Vehicle-to-Everything (V2X) systems is given. L1-metric was chosen as a metric because of its active use in cities with modern layout. Two approaches to the description and evaluation of the efficiency of interaction of boundary devices in a traditional configuration and using a cluster scheme with a shared cache are considered. A mathematical model is constructed and an analysis of its effectiveness is carried out. It is shown that the introduction of new IEEE 802.11bd standards will increase the percentage of serviced devices, thereby minimize the overall delay of computing, which will improve the efficiency of the V2X-system. The results of the study can be used in the design and deployment of automated traffic control systems in cities.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Sensitivity Investigation of Fiber Optic Paths in the Framework of an Intruder Localization at a Protected Facility 保护设施中入侵者定位框架下光纤路径的灵敏度研究
Proceedings of Telecommunication Universities Pub Date : 2023-03-09 DOI: 10.31854/1813-324x-2023-9-1-52-58
V. Kartak, O. Gubareva, M. Dashkov, V. Gureev, A. Evtushenko
{"title":"The Sensitivity Investigation of Fiber Optic Paths in the Framework of an Intruder Localization at a Protected Facility","authors":"V. Kartak, O. Gubareva, M. Dashkov, V. Gureev, A. Evtushenko","doi":"10.31854/1813-324x-2023-9-1-52-58","DOIUrl":"https://doi.org/10.31854/1813-324x-2023-9-1-52-58","url":null,"abstract":"The paper considers the possibility of using communication lines already existing at urban development sites based on such information transfer technologies as «fiber-to-the-office» and «fiber-to-the-desk» in relation to the tasks of physical protection of objects. The aspects of using distributed acoustic sensors based on a phase-sensitive optical time-domain reflectometer for localizing sources of acoustic impact in real-time, that is, for determining the location of an intruder on a protected object, are considered. The sensitivity of optical paths to acoustic influences corresponding to the speech signals of the alleged intruder was assessed. An optical path based on optical fiber in an optical module with a hydrophobic filling is considered. An analysis of the spectral sensitivity of the optical fiber samples under study has been carried out. An assessment of the influence of the conditions for the passage of the route of laying the optical cable and the interaction of the acoustic sensor with the surrounding objects was carried out. The analysis of the results obtained during the test events at the experimental site was carried out.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Post-Quantum Cryptographic Access Control Based on Hierarchical RBAC Model 基于分层RBAC模型的后量子密码访问控制
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-119-129
A. Yarmak
{"title":"Post-Quantum Cryptographic Access Control Based on Hierarchical RBAC Model","authors":"A. Yarmak","doi":"10.31854/1813-324x-2022-8-4-119-129","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-119-129","url":null,"abstract":"The paper considers the isogeny-based cryptographically enforced data access control scheme CSIDH-HRBAC for untrusted cloud. CSIDH-HRBAC is based on a role-based access control model with support for a role hierarchy system. The proposed scheme implies the presence of a trusted party that manages cryptographic keys associated with users, roles, files. The basic procedures for gaining access to data, revoking access rights, adding new entities and updating parameters are given. Typical scenarios of attacks on the proposed scheme are considered, including role substitution, collusion by participants to compute the parent role key, attempt to access data after role revocation from user. To evaluate the performance of cryptographic operations, the simulation of the basic procedures was performed. The advantages and limitations of the CSIDH-HRBAC scheme are discussed. In particular, the need for protection against threats from the administrator, the prospect of using lattice-based post-quantum cryptographic primitives is noted.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131132154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Core Optical Fiber with Stepped Single-Mode Cores. Part 1. Insulation with Solid Clads 阶梯式单模芯多芯光纤。第1部分。带固体包层的绝缘
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-28-38
M. Bylina, L. Gultyaeva
{"title":"Multi-Core Optical Fiber with Stepped Single-Mode Cores. Part 1. Insulation with Solid Clads","authors":"M. Bylina, L. Gultyaeva","doi":"10.31854/1813-324x-2022-8-4-28-38","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-28-38","url":null,"abstract":"An optical fiber with several unrelated cores inside a common clad (multi-core fiber) is used to increase the capacity of linear paths of communication systems. The number of cores in one fiber is limited by mutual influences between them, to reduce which various design solutions are used. The aim of the work is to compare various multicore fibers and identify structures that allow placing the largest number of cores in a common shell with a standard diameter of 125 microns. In the first part of this paper, modeling of single-mode fibers with cores isolated by additional solid shells is carried out. As a result of modeling, the characteristics of the fundamental modes of the cores of each fiber are calculated – the distribution of the electric field strength, chromatic dispersion and the diameter of the field of the fundamental mode, a technique is proposed and an assessment of mutual influences is carried out, the maximum possible number of cores is determined. It is shown that the insulating clad reduces mutual influences and allows increasing the number of cores by reducing the distance between them.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115544454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Usage of LDPC Codes in a Gilbert Channel LDPC码在吉尔伯特信道中的使用
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-55-63
A. Ovchinnikov, A. Veresova, A. Fominykh
{"title":"Usage of LDPC Codes in a Gilbert Channel","authors":"A. Ovchinnikov, A. Veresova, A. Fominykh","doi":"10.31854/1813-324x-2022-8-4-55-63","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-55-63","url":null,"abstract":"Although low-density parity-check (LDPC) codes in modern communication standards have been extensively studied over a memoryless channel, their burst error correction capacity in channels with memory has yet to be thoroughly analyzed. The conventional approach to transmission in channels with memory uses interleaving within a buffer of several codewords. However, such an approach reduces the efficiency of the redundancy embedded by the error-correcting code. It is known from information theory that considering channel memory during decoding allows the transmission rate to be increased. An evaluation of the decoding error probability of different types of low-density parity-check codes in channels with memory is presented along with estimates of minimum distance and burst error correction capability for the considered codes. The decoding error probability is estimated for conventional decoding with deinterleaving and decoding taking channel memory into account. The decoding error probability is estimated for several parameters of a channel with memory and different buffer lengths. The obtained results reveal the absence of the unique decoding approach for all parameters of the channel with memory. The best decoding error probability is determined by the degree of channel memory correlation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127664957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flying Fog Mobile Edge Computing Based on UAV-Assisted for IoT Nodes in Smart Agriculture 基于无人机辅助的智能农业物联网节点飞雾移动边缘计算
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-82-88
A. Alzaghir
{"title":"Flying Fog Mobile Edge Computing Based on UAV-Assisted for IoT Nodes in Smart Agriculture","authors":"A. Alzaghir","doi":"10.31854/1813-324x-2022-8-4-82-88","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-82-88","url":null,"abstract":"Flying Fog Mobile Edge Computing can play a pivotal part in the field of smart agriculture. Moreover, is an ideal choice for the significant features it enjoys such as its capability of functioning in remote locations, its wide coverage of areas, sufficient bandwidth, as well as its ability of dealing with connectivity issues. Hence, it is essential for smart agriculture provided with IoT devices to utilize offloading data in a real time and execution the satisfactory steps for a certain circumstance by using flying fog mobile edge computing. Flying Fog Mobile Edge Computing is a good choice to treat connectivity issues. In this paper, proposed a cooperation paradigm of UAVs and IoT devices towards smart agriculture for offloading and executing the computation tasks on-behalf IoT nodes by using dynamic programming algorithm and get satisfactory solution for constrained optimization problem and achieving minimize delay to accomplish tasks.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127918163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel 确定加密通信信道中流量类型的方法和算法
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-109-118
S. Ishkuvatov
{"title":"Method and Algorithm for Determining the Type of Traffic in an Encrypted Communication Channel","authors":"S. Ishkuvatov","doi":"10.31854/1813-324x-2022-8-4-109-118","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-109-118","url":null,"abstract":"The article proposes a method for determining the composition of protocols used in IPsec communication channel, based on the regularities of the chronology and the lengths of encrypted load packets. The characteristic informative features of the protocols are considered. An algorithm is given to obtain the length values of ESP packets containing arbitrary user data for common modes of IPsec tunnel operation.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"35 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Support Methodology Based on Evaluation of Customer Experience and Telecommunications Operator Efficiency Indicators 基于客户体验评价和电信运营商效率指标的决策支持方法
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-75-81
V. Akishin
{"title":"Decision Support Methodology Based on Evaluation of Customer Experience and Telecommunications Operator Efficiency Indicators","authors":"V. Akishin","doi":"10.31854/1813-324x-2022-8-4-75-81","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-75-81","url":null,"abstract":"The article considers the methodology for dynamic analysis of the cognitive model for assessing customer experience in the context of communication providers. The relevance of the study is due to the need for telecom operators to have a decision support system that allows analyzing dependence of customer experience on the efficiency of the company's operating environment, as well as emulating customer experience management scenarios in the context of the main sales and service processes. The objective of the study is to formalize the methodology of dynamic analysis of the model for assessing the integral customer experience that is based on fuzzy cognitive maps of the hierarchical structure. In particular, the mechanics of changing target factors (i.e., customer experience indicators) when perturbing control factors (i.e., operational performance indicators that affect customer experience) are investigated.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116600508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Approach to Data Collection and Processing from Automatic Identification System for Ship Traffic Organization 船舶交通组织自动识别系统数据采集与处理的现代方法
Proceedings of Telecommunication Universities Pub Date : 2023-01-10 DOI: 10.31854/1813-324x-2022-8-4-48-54
V. Karetnikov, Ya. Kosiak, O. Danilov, A. Bespalov
{"title":"Modern Approach to Data Collection and Processing from Automatic Identification System for Ship Traffic Organization","authors":"V. Karetnikov, Ya. Kosiak, O. Danilov, A. Bespalov","doi":"10.31854/1813-324x-2022-8-4-48-54","DOIUrl":"https://doi.org/10.31854/1813-324x-2022-8-4-48-54","url":null,"abstract":"The article is devoted to the collection and generalization of automatic identification system (AIS) data on the movement of ships, both on inland waterways and in coastal marine areas. The list of information necessary for the further carrying out of researches on the organization of movement is defined. Attention is paid to the peculiarities of obtaining data from technical means of communication and open online resources. The approach to statistical data accumulation from AIS receiver using Raspberry Pi single-board microcomputer has been offered. The application, which reads data from the serial port and transfers them to the library and then to the PostgreSQL database management system server, is implemented. It is concluded that the proposed approach is constructive and potentially effective.","PeriodicalId":298883,"journal":{"name":"Proceedings of Telecommunication Universities","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134423899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信