IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)最新文献

筛选
英文 中文
Concept of the information security for the exam process 信息安全的概念为考试过程
B. Ilyukhin
{"title":"Concept of the information security for the exam process","authors":"B. Ilyukhin","doi":"10.1109/SIBCOM.2001.977522","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977522","url":null,"abstract":"The united state exam (USE) is carried out in a test format. Experience in the leading countries shows that testing is the most objective form of knowledge control, and has a wide application. However, a number of problems have arisen, including organizational problems. It is assumed that the solution to these problems are decided by the special state service and the availability of a means of communication, ensuring the necessary level of effectiveness and secrecy.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The access codes 访问码
D. Baranov
{"title":"The access codes","authors":"D. Baranov","doi":"10.1109/SIBCOM.2001.977529","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977529","url":null,"abstract":"With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is \"mobile\", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
p-adic attack of knapsack cryptosystem 背包密码系统的p进攻击
A. Abramov
{"title":"p-adic attack of knapsack cryptosystem","authors":"A. Abramov","doi":"10.1109/SIBCOM.2001.977500","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977500","url":null,"abstract":"The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols </spl alpha//sub 1/, /spl alpha//sub 2/, /spl alpha//sub 3/, ..., /spl alpha//sub n/> are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational intelligence with fuzzy logic for complex systems 复杂系统的模糊逻辑计算智能
J. Singh
{"title":"Computational intelligence with fuzzy logic for complex systems","authors":"J. Singh","doi":"10.1109/SIBCOM.2001.977533","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977533","url":null,"abstract":"Fuzzy logic is an innovative technology that enhances conventional system design with engineering expertise. The working of fuzzy logic becomes clear if one focuses on the working of present day computers. The working of present day computers is based on simple binary logic. Boolean logic is good for computing, but it does not work for imprecise values, since these computers normally solve problems by breaking them down into a series of binary decisions. Fuzzy logic allows the computers to assign numerical values that fall between \"ones\" and \"zeroes\", there is no clear border line between these values. Instead of statement being only true or false, fuzzy theory sets up condition as slow, medium, and fast. This paper deals with the state of art of fuzzy logic and with its advantages.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of test calls for quality of service evaluation in mobile radio communications systems 移动无线电通信系统服务质量评价试验需求的应用
J.A. Tkachewa, L.I. Meikshan
{"title":"Application of test calls for quality of service evaluation in mobile radio communications systems","authors":"J.A. Tkachewa, L.I. Meikshan","doi":"10.1109/SIBCOM.2001.977517","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977517","url":null,"abstract":"Summary form only given. Data collection and analysis for quality evaluation of mobile communication services may be performed by the corresponding service provider, representatives of consumer rights, defense and the experts of the certification commission as well. With this examination a number of test calls are performed making use of automatic answer-back units. As a result of these calls the following quantities may be evaluated for various kinds of connections and for the network on an average: the probability of connection inaccessibility (probability of call loss); the average setup time of the connection; and the transmission quality parameters. Test calls for defining the service quality characteristics of cellular and trunking mobile radio communications networks are carried out from a moving car. Preliminarily the route should be selected to cover as much as possible the number of the network service areas. Based on Wald theory of successive analysis the test procedure is presented. In combination with the principle of priority distribution this procedure gives a speedy answer to the question of whether to recognize the service quality satisfactory or not. Special tables are prepared for practical realization of the procedure under consideration.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DSP and modem in the aid of information technology 信息技术辅助下的DSP和调制解调器
D. Sharma, S. S. Bhatti, J. Singh
{"title":"DSP and modem in the aid of information technology","authors":"D. Sharma, S. S. Bhatti, J. Singh","doi":"10.1109/SIBCOM.2001.977503","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977503","url":null,"abstract":"The present age is the age of information technology (IT), due to which the world has shrunk into a small personal computer (PC). Information in any form (speech, text or pictures) can be transmitted from one corner of the world to another without any delay. IT has revolutionized the entire communication systems. Data communication is the area which is changing very rapidly. Communication of data can be done via various channels such as analog phone lines, digital subscriber loop (DSL), fiber optic cables etc. Although communication systems are switching from analog to their digital counterpart due to less noise and the superiority of digital systems over analog, the analog telephone system remains the primary facility utilized for data communication. According to industry research firm Jupiter Communication, there are more than 50 million people around the world-using dial up technology to access the Internet, that is why the present case study is aimed at data communication over analog telephone lines also called public switched telephone networks (PSTN) line or general switched telephone networks (GSTN) line. The recent expansion in the use of Internet and multimedia applications has created the requirement for much higher bit rates. Using current V.90 modem technology along with the use of advanced DSP like Texas Instrument's TMS320C6201 one can implement a whole modem on a single chip and achieve data rates up to 56 kbps. Hence it is concluded that both DSP and modem play a very important role in information technology.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DQPSK and adaptive approach in mobile communication 移动通信中的DQPSK与自适应方法
B. Patil, J. Singh
{"title":"DQPSK and adaptive approach in mobile communication","authors":"B. Patil, J. Singh","doi":"10.1109/SIBCOM.2001.977530","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977530","url":null,"abstract":"The era of wireless has just begun, which is a good sign for people to get communication faster and in a reliable manner at any place. This demanding situation for mobile communication is fulfilled if one provides a good communication method at low cost. Bandwidth and power are the main concerns for this type of communication. The QPSK method offers the best trade-off between these two. For a robust receiver structure, one has to switch from coherent detection to differential detection. The bit error rate gap between the coherent and the differential can be reduced by the application of a technique which uses adaptive algorithms.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical methods of visualization of the images 图像可视化的数学方法
D. Sukhanov, A. Sukhanov
{"title":"Mathematical methods of visualization of the images","authors":"D. Sukhanov, A. Sukhanov","doi":"10.1109/SIBCOM.2001.977524","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977524","url":null,"abstract":"Frequently, for satellite observation of the Earth's surface, it is necessary to increase the resolution of the received images. It is possible to use an interpolation (linear, spline, etc.) to achieve this purpose. Methods of visualizing the received images by interpolation of the initial image are considered.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto miracles with random oracle 密码奇迹随机神谕
R. Hady, A. Agranovsky
{"title":"Crypto miracles with random oracle","authors":"R. Hady, A. Agranovsky","doi":"10.1109/SIBCOM.2001.977502","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977502","url":null,"abstract":"Cryptographic theory has provided the notion of provable security which is often an unattainable ideal in practice. Theoretical work gains provable secure protocols only at the cost of efficiency. Theorists are moving from certain primitives towards powerful sets of primitives. That happens because provable secure protocols often have a complex and obscure design, which leads to inefficiency and mistakes. To bridge the gap between cryptographic theory and practice, the random oracle hypothesis was developed. This hypothesis yields crypto protocols much more efficient than standard ones. The article describes the concept of the random oracle model and the replacement of random oracles with hash functions. Practical work shows that no one has been able to perform a successful attack on such crypto protocols.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital temperature regulation at fabrication of the communication elements by molecular-beam epitaxy method 用分子束外延法制造通信元件时的数字温度调节
N. L. Orlikov, E. V. Karpov, R.S. Petrakov
{"title":"Digital temperature regulation at fabrication of the communication elements by molecular-beam epitaxy method","authors":"N. L. Orlikov, E. V. Karpov, R.S. Petrakov","doi":"10.1109/SIBCOM.2001.977515","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977515","url":null,"abstract":"The control process of the metal vaporizer heating system based on an ordinary IBM-PC computer and controller on a standard IC is considered. The method of parameter reproducibility proposed in the paper is based on digitization of signal and its processing on a microcomputer. It is possible to describe of the reaction of the adjustable variable on the effect change by a Laplace equation with an aperiodic first-order section, at the source of which there is a signal delay.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信