{"title":"Concept of the information security for the exam process","authors":"B. Ilyukhin","doi":"10.1109/SIBCOM.2001.977522","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977522","url":null,"abstract":"The united state exam (USE) is carried out in a test format. Experience in the leading countries shows that testing is the most objective form of knowledge control, and has a wide application. However, a number of problems have arisen, including organizational problems. It is assumed that the solution to these problems are decided by the special state service and the availability of a means of communication, ensuring the necessary level of effectiveness and secrecy.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The access codes","authors":"D. Baranov","doi":"10.1109/SIBCOM.2001.977529","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977529","url":null,"abstract":"With the growing popularity of the Internet and its penetration into all aspects of life, the intensity of information exchange has increased. There are two kinds of information: (1) useful (urgent for its recipient or owner); (2) useless (for example, daily e-mail, on which recipient was not signed). Thereby, there is a problem of filtering, the division of information by its components. For this purpose, it is possible to offer a system of access codes (AC), for sending messages by e-mail, telephone etc. The access code is an encrypted information unit (including data such as priority, dates etc.), enabling identification of the owner uniquely (at decoding). The owner or user can send the AC to persons from whom he wants to receive messages. The AC can be created for one or several messages and can keep its validity until specially cancelled, or until the validity date expires. For enterprises and organizations using the AC system, it is possible to make a profit both by AC sale and resale and by increasing productivity. The formation and checks of AC purchase schemes are considered. From the standpoint of information protection, the algorithm of AC reception is \"mobile\", that is independent of algorithm and encryption key (it is possible to use any algorithms and keys for AC reception). The AC system can be introduced practically into all communications.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124733549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"p-adic attack of knapsack cryptosystem","authors":"A. Abramov","doi":"10.1109/SIBCOM.2001.977500","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977500","url":null,"abstract":"The cryptattack of homogeneous knapsack systems is considered. The system is called homogeneous if the message symbols </spl alpha//sub 1/, /spl alpha//sub 2/, /spl alpha//sub 3/, ..., /spl alpha//sub n/> are changed from 0 to q, q/spl ges/1. This attack is based on presentation of the cryptogram and the public key components by p-adic decomposition. The question of cryptattack complexity is brought to the problem of the module p selection while taking into account the transfers expansion limitation only from one digit to next old digit. This attack breaks most of the classic knapsack systems without selection and essentially decreases the selection for knapsack cryptosystems. The developed scheme of attack allows estimating the time of decryption before the cryptogram is received. That leads to essential speeding up of decryption.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127840451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational intelligence with fuzzy logic for complex systems","authors":"J. Singh","doi":"10.1109/SIBCOM.2001.977533","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977533","url":null,"abstract":"Fuzzy logic is an innovative technology that enhances conventional system design with engineering expertise. The working of fuzzy logic becomes clear if one focuses on the working of present day computers. The working of present day computers is based on simple binary logic. Boolean logic is good for computing, but it does not work for imprecise values, since these computers normally solve problems by breaking them down into a series of binary decisions. Fuzzy logic allows the computers to assign numerical values that fall between \"ones\" and \"zeroes\", there is no clear border line between these values. Instead of statement being only true or false, fuzzy theory sets up condition as slow, medium, and fast. This paper deals with the state of art of fuzzy logic and with its advantages.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of test calls for quality of service evaluation in mobile radio communications systems","authors":"J.A. Tkachewa, L.I. Meikshan","doi":"10.1109/SIBCOM.2001.977517","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977517","url":null,"abstract":"Summary form only given. Data collection and analysis for quality evaluation of mobile communication services may be performed by the corresponding service provider, representatives of consumer rights, defense and the experts of the certification commission as well. With this examination a number of test calls are performed making use of automatic answer-back units. As a result of these calls the following quantities may be evaluated for various kinds of connections and for the network on an average: the probability of connection inaccessibility (probability of call loss); the average setup time of the connection; and the transmission quality parameters. Test calls for defining the service quality characteristics of cellular and trunking mobile radio communications networks are carried out from a moving car. Preliminarily the route should be selected to cover as much as possible the number of the network service areas. Based on Wald theory of successive analysis the test procedure is presented. In combination with the principle of priority distribution this procedure gives a speedy answer to the question of whether to recognize the service quality satisfactory or not. Special tables are prepared for practical realization of the procedure under consideration.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DSP and modem in the aid of information technology","authors":"D. Sharma, S. S. Bhatti, J. Singh","doi":"10.1109/SIBCOM.2001.977503","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977503","url":null,"abstract":"The present age is the age of information technology (IT), due to which the world has shrunk into a small personal computer (PC). Information in any form (speech, text or pictures) can be transmitted from one corner of the world to another without any delay. IT has revolutionized the entire communication systems. Data communication is the area which is changing very rapidly. Communication of data can be done via various channels such as analog phone lines, digital subscriber loop (DSL), fiber optic cables etc. Although communication systems are switching from analog to their digital counterpart due to less noise and the superiority of digital systems over analog, the analog telephone system remains the primary facility utilized for data communication. According to industry research firm Jupiter Communication, there are more than 50 million people around the world-using dial up technology to access the Internet, that is why the present case study is aimed at data communication over analog telephone lines also called public switched telephone networks (PSTN) line or general switched telephone networks (GSTN) line. The recent expansion in the use of Internet and multimedia applications has created the requirement for much higher bit rates. Using current V.90 modem technology along with the use of advanced DSP like Texas Instrument's TMS320C6201 one can implement a whole modem on a single chip and achieve data rates up to 56 kbps. Hence it is concluded that both DSP and modem play a very important role in information technology.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DQPSK and adaptive approach in mobile communication","authors":"B. Patil, J. Singh","doi":"10.1109/SIBCOM.2001.977530","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977530","url":null,"abstract":"The era of wireless has just begun, which is a good sign for people to get communication faster and in a reliable manner at any place. This demanding situation for mobile communication is fulfilled if one provides a good communication method at low cost. Bandwidth and power are the main concerns for this type of communication. The QPSK method offers the best trade-off between these two. For a robust receiver structure, one has to switch from coherent detection to differential detection. The bit error rate gap between the coherent and the differential can be reduced by the application of a technique which uses adaptive algorithms.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical methods of visualization of the images","authors":"D. Sukhanov, A. Sukhanov","doi":"10.1109/SIBCOM.2001.977524","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977524","url":null,"abstract":"Frequently, for satellite observation of the Earth's surface, it is necessary to increase the resolution of the received images. It is possible to use an interpolation (linear, spline, etc.) to achieve this purpose. Methods of visualizing the received images by interpolation of the initial image are considered.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto miracles with random oracle","authors":"R. Hady, A. Agranovsky","doi":"10.1109/SIBCOM.2001.977502","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977502","url":null,"abstract":"Cryptographic theory has provided the notion of provable security which is often an unattainable ideal in practice. Theoretical work gains provable secure protocols only at the cost of efficiency. Theorists are moving from certain primitives towards powerful sets of primitives. That happens because provable secure protocols often have a complex and obscure design, which leads to inefficiency and mistakes. To bridge the gap between cryptographic theory and practice, the random oracle hypothesis was developed. This hypothesis yields crypto protocols much more efficient than standard ones. The article describes the concept of the random oracle model and the replacement of random oracles with hash functions. Practical work shows that no one has been able to perform a successful attack on such crypto protocols.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117013986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital temperature regulation at fabrication of the communication elements by molecular-beam epitaxy method","authors":"N. L. Orlikov, E. V. Karpov, R.S. Petrakov","doi":"10.1109/SIBCOM.2001.977515","DOIUrl":"https://doi.org/10.1109/SIBCOM.2001.977515","url":null,"abstract":"The control process of the metal vaporizer heating system based on an ordinary IBM-PC computer and controller on a standard IC is considered. The method of parameter reproducibility proposed in the paper is based on digitization of signal and its processing on a microcomputer. It is possible to describe of the reaction of the adjustable variable on the effect change by a Laplace equation with an aperiodic first-order section, at the source of which there is a signal delay.","PeriodicalId":424812,"journal":{"name":"IEEE-Siberian Workshop of Students and Young Researches. Modern Communication Technologies SIBCOM-2001. Proceedings (Cat. No.01EX452)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114855080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}