Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431256
R. Gorbachev, A. Novikov, A. Kalinkin, Artem Cheranev, E. Zakharova
This paper describes the applying of simulation modelling as a method for verifying the decision support system and forecasting railway traffic in the dispatching management of railway transport. This decision support system would be realised using artificial intelligence methods and on the training, stage requires an additional check of those decisions. For this purpose, a railway traffic model on a test railway section was implemented using a virtual model of the railway section's infrastructure. A virtual model of the railway section infrastructure is realised using the MPC-EL microprocessor-based centralization of arrows and traffic lights. The combination of a virtual railway section and a railway traffic model form a unified system. This system making a forecast train schedule based on initial data of solutions which are received from the decision support system. The verification of solutions obtained from the DSS would check this railway schedule practicability in real conditions. An additional feature of that system supporting the ability to work on workstations with the Elbrus processor, which in turn contributes substitution to the imported component base on the Russian Railways.
{"title":"Applying Virtual Modelling to Verify Control Systems Decision with Artificial Intelligence in Railway Transport","authors":"R. Gorbachev, A. Novikov, A. Kalinkin, Artem Cheranev, E. Zakharova","doi":"10.1109/EnT50437.2020.9431256","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431256","url":null,"abstract":"This paper describes the applying of simulation modelling as a method for verifying the decision support system and forecasting railway traffic in the dispatching management of railway transport. This decision support system would be realised using artificial intelligence methods and on the training, stage requires an additional check of those decisions. For this purpose, a railway traffic model on a test railway section was implemented using a virtual model of the railway section's infrastructure. A virtual model of the railway section infrastructure is realised using the MPC-EL microprocessor-based centralization of arrows and traffic lights. The combination of a virtual railway section and a railway traffic model form a unified system. This system making a forecast train schedule based on initial data of solutions which are received from the decision support system. The verification of solutions obtained from the DSS would check this railway schedule practicability in real conditions. An additional feature of that system supporting the ability to work on workstations with the Elbrus processor, which in turn contributes substitution to the imported component base on the Russian Railways.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132857236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431290
Egor Shiryaev, E. Golimblevskaia, M. Babenko, A. Tchernykh, B. Pulido-Gaytán
The operation of number comparison is widely used in the implementation of most modern algorithms. The implementation of the algorithm for number comparison in the Residue Number System (RNS) consists of two stages. The first stage is calculating the positional characteristic of the modular number. The second stage is comparing positional characteristics of modular numbers in the positional number system. The article studies various comparison algorithms with software implementation in the Python programming language. The research consists in testing algorithms with different bit width and length of the RNS module vector. Also in this work, the improvement of the approximate method on the reduction of requirements for accuracy is carried out. The use of this method is based on low precision requirements for the comparison operation. It was found that in a certain range accuracy is not critical, which makes it possible to apply this method in a fairly wide range of problems.
{"title":"Improvement of the Approximate Method for the Comparison Operation in the RNS","authors":"Egor Shiryaev, E. Golimblevskaia, M. Babenko, A. Tchernykh, B. Pulido-Gaytán","doi":"10.1109/EnT50437.2020.9431290","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431290","url":null,"abstract":"The operation of number comparison is widely used in the implementation of most modern algorithms. The implementation of the algorithm for number comparison in the Residue Number System (RNS) consists of two stages. The first stage is calculating the positional characteristic of the modular number. The second stage is comparing positional characteristics of modular numbers in the positional number system. The article studies various comparison algorithms with software implementation in the Python programming language. The research consists in testing algorithms with different bit width and length of the RNS module vector. Also in this work, the improvement of the approximate method on the reduction of requirements for accuracy is carried out. The use of this method is based on low precision requirements for the comparison operation. It was found that in a certain range accuracy is not critical, which makes it possible to apply this method in a fairly wide range of problems.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431245
Huu Loc Pham
In this paper, the data storage process is considered from the point of view of coding theory. A hybrid of data storage systems and error-correcting code (ECC) is a promising technology storage with high performance. Error correction is inevitable in the data storage system and the error rate will increase with the number of write/delete and save data. However, the error-correction code degrades I/O performance of the system due to increased reading and encoding/decoding time from memory. Our work is to investigate the applicability of term-rank code in the data storage system.
{"title":"Term-Rank Codes for Data Storage Systems","authors":"Huu Loc Pham","doi":"10.1109/EnT50437.2020.9431245","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431245","url":null,"abstract":"In this paper, the data storage process is considered from the point of view of coding theory. A hybrid of data storage systems and error-correcting code (ECC) is a promising technology storage with high performance. Error correction is inevitable in the data storage system and the error rate will increase with the number of write/delete and save data. However, the error-correction code degrades I/O performance of the system due to increased reading and encoding/decoding time from memory. Our work is to investigate the applicability of term-rank code in the data storage system.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431318
Himanshu Rai, S. Ojha, Alexey Nazarov
Resource Management is a central aspect in Cloud Computing. This is because the Cloud Services are offered to several users, in a way which ensures rapid deployment and on demand availability. The primary motivation behind cloud computing is to access desired resource over cloud/internet, using thin-clients capable of running only an internet browser program. A given physical resources is extended as multiple virtual resources which can be allocated to several users through virtualization paradigm. One a particular requirement is completed; the corresponding virtual resource can be allocated to another user or shall be stopped for execution to save energy/ enhance throughput. Resource management in a scenario, consisting of large population of users, over a number of resources, with various priorities, under different load conditions is a complex optimization problem. This issue has been discussed at length in research literature over different service models like SaaS, PaaS and IaaS. In this paper, a generic model of cloud service facility is considered which falls under the category of public cloud. Nature inspired algorithm, particularly, particle swarm optimization is presented to manage the request-response architecture, for minimum latency. The proposed approach outperforms the benchmark approaches presented so far. The simulation is performed on CloudSim and the results obtained are in excellent agreement to the analytical model.
{"title":"A Hybrid Approach for Process Scheduling in Cloud Environment Using Particle Swarm Optimization Technique","authors":"Himanshu Rai, S. Ojha, Alexey Nazarov","doi":"10.1109/EnT50437.2020.9431318","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431318","url":null,"abstract":"Resource Management is a central aspect in Cloud Computing. This is because the Cloud Services are offered to several users, in a way which ensures rapid deployment and on demand availability. The primary motivation behind cloud computing is to access desired resource over cloud/internet, using thin-clients capable of running only an internet browser program. A given physical resources is extended as multiple virtual resources which can be allocated to several users through virtualization paradigm. One a particular requirement is completed; the corresponding virtual resource can be allocated to another user or shall be stopped for execution to save energy/ enhance throughput. Resource management in a scenario, consisting of large population of users, over a number of resources, with various priorities, under different load conditions is a complex optimization problem. This issue has been discussed at length in research literature over different service models like SaaS, PaaS and IaaS. In this paper, a generic model of cloud service facility is considered which falls under the category of public cloud. Nature inspired algorithm, particularly, particle swarm optimization is presented to manage the request-response architecture, for minimum latency. The proposed approach outperforms the benchmark approaches presented so far. The simulation is performed on CloudSim and the results obtained are in excellent agreement to the analytical model.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130075981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431279
E. Kozhin, Alexey Kozhin, D. Shpagilev
Networks-on-chip play important role in modern multi-core processors linking all system components together. Their topologies determine a scalability of bandwidth and memory access time depending on the number of processor cores. In this work networks-on-chip with 2d mesh and 2d torus-mesh topologies for 8-, 12- and 16-core Elbrus processors were studied taking into account constraints of their physical design.
{"title":"Performance Analysis of Network-on-Chip Topologies for Elbrus Multi-Core Processors","authors":"E. Kozhin, Alexey Kozhin, D. Shpagilev","doi":"10.1109/EnT50437.2020.9431279","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431279","url":null,"abstract":"Networks-on-chip play important role in modern multi-core processors linking all system components together. Their topologies determine a scalability of bandwidth and memory access time depending on the number of processor cores. In this work networks-on-chip with 2d mesh and 2d torus-mesh topologies for 8-, 12- and 16-core Elbrus processors were studied taking into account constraints of their physical design.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132396370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431255
D. Parfenov, L. Kuznetsova, N. Yanishevskaya, I. Bolodurina, A. Zhigalov, L. Legashev
This article studies the actual problem of network security. In particular, the task of identifying DDoS attacks is being solved. As part of the study, a solution was proposed based on expanding the set of features traditionally used to identify attacks on networks using a specialized hashing algorithm for individual blocks of device configuration files in the considered network of devices. Using the proposed approach, the identification of attacks was carried out using machine learning methods to ensure security in the Internet of Things networks. The approaches to the binary and multiclass classification of network traffic were investigated to detect attacking influences, taking into account the proposed hashing algorithm. As part of a pilot study, the article provides a comparative analysis of machine learning methods such as Gradient Boosting, AdaBoost, and CatBoost using the CICDDoS2019 dataset. It was found that in the case of binary classification, the best classifier from the considered ones is CatBoost with an accuracy of 99.3%, which is on average 0.3% higher than the existing algorithms. In the multiclass classification, the CatBoost algorithm on a feature set using hashing of data from network devices also shows the best performance, with an accuracy level of 97%, which is at least 3.9% better than similar classifiers. The decrease in accuracy in the multiclass classification did not have a significant effect on the result, but it made it possible to increase the solution performance by 11.5% in comparison with the full set of features used in traditional attack analysis.
{"title":"Research Application of Ensemble Machine Learning Methods to the Problem of Multiclass Classification of DDoS Attacks Identification","authors":"D. Parfenov, L. Kuznetsova, N. Yanishevskaya, I. Bolodurina, A. Zhigalov, L. Legashev","doi":"10.1109/EnT50437.2020.9431255","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431255","url":null,"abstract":"This article studies the actual problem of network security. In particular, the task of identifying DDoS attacks is being solved. As part of the study, a solution was proposed based on expanding the set of features traditionally used to identify attacks on networks using a specialized hashing algorithm for individual blocks of device configuration files in the considered network of devices. Using the proposed approach, the identification of attacks was carried out using machine learning methods to ensure security in the Internet of Things networks. The approaches to the binary and multiclass classification of network traffic were investigated to detect attacking influences, taking into account the proposed hashing algorithm. As part of a pilot study, the article provides a comparative analysis of machine learning methods such as Gradient Boosting, AdaBoost, and CatBoost using the CICDDoS2019 dataset. It was found that in the case of binary classification, the best classifier from the considered ones is CatBoost with an accuracy of 99.3%, which is on average 0.3% higher than the existing algorithms. In the multiclass classification, the CatBoost algorithm on a feature set using hashing of data from network devices also shows the best performance, with an accuracy level of 97%, which is at least 3.9% better than similar classifiers. The decrease in accuracy in the multiclass classification did not have a significant effect on the result, but it made it possible to increase the solution performance by 11.5% in comparison with the full set of features used in traditional attack analysis.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116807860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431298
Francois Xavier Habinshuti
the challenge is to provide a convenient tool for modeling traffic problems. Many factors affect traffic related to the driver or human factor, weather factor, road conditions, vehicle performance and characteristics factor, etc. It is necessary to propose a model where the influence of these factors can be described uniformly. Furthermore, the factors described are loaded into the general mechanism of motion modeling. To overcome this problem we started to build a DSL language of Traffic Flow Factor Framework (TFFF). This paper introduces an Xtext grammar of weather condition model, which is part of factors. It also touches on Longitudinal Model (LM) a mathematical model used more often to capture the weather factors involved in driving vehicles and traffic flow modeling.
{"title":"Domain Specific Language of Traffic Flow Factor Framework","authors":"Francois Xavier Habinshuti","doi":"10.1109/EnT50437.2020.9431298","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431298","url":null,"abstract":"the challenge is to provide a convenient tool for modeling traffic problems. Many factors affect traffic related to the driver or human factor, weather factor, road conditions, vehicle performance and characteristics factor, etc. It is necessary to propose a model where the influence of these factors can be described uniformly. Furthermore, the factors described are loaded into the general mechanism of motion modeling. To overcome this problem we started to build a DSL language of Traffic Flow Factor Framework (TFFF). This paper introduces an Xtext grammar of weather condition model, which is part of factors. It also touches on Longitudinal Model (LM) a mathematical model used more often to capture the weather factors involved in driving vehicles and traffic flow modeling.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115190102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431302
D. A. Borisov, S. Skobelev
The modification proposed in the paper includes approximation of the contour of the cylinder cross-section by a polygon and use of the EFIE method for the PEC polygonal cylinder. The EFIE is reduced to a system of algebraic equations using a uniform current distribution on each polygon side and collocation method with collocation points located in the midpoints of the polygon sides. All the diagonal matrix elements and elements located near them are represented by analytical expressions based on the small argument approximation of the kernel with subsequent analytical integration. The integrals for corresponding to the other matrix elements are analytically represented using the centroid approximation. The effectiveness of the proposed modification is demonstrated using H-polarized plane wave scattering by the PEC cylinders of elliptical and square cross-sections.
{"title":"Modification of the Method of EFIE in 2D Problem of H-Polarized Wave Scattering by PEC Cylinder of Arbitrary Cross-Section","authors":"D. A. Borisov, S. Skobelev","doi":"10.1109/EnT50437.2020.9431302","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431302","url":null,"abstract":"The modification proposed in the paper includes approximation of the contour of the cylinder cross-section by a polygon and use of the EFIE method for the PEC polygonal cylinder. The EFIE is reduced to a system of algebraic equations using a uniform current distribution on each polygon side and collocation method with collocation points located in the midpoints of the polygon sides. All the diagonal matrix elements and elements located near them are represented by analytical expressions based on the small argument approximation of the kernel with subsequent analytical integration. The integrals for corresponding to the other matrix elements are analytically represented using the centroid approximation. The effectiveness of the proposed modification is demonstrated using H-polarized plane wave scattering by the PEC cylinders of elliptical and square cross-sections.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128580791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431296
Alireza Nik Aein Koupaei, A. Nazarov
In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, Databases, cars, and industrial equipment's are now connected to the internet. There are over several billion electronic equipment devices already on the internet, and within a decade these number is expected to increase massively. Info-communications have various software security solutions to defend and protect them from most of threats and attacks, although there are indiscernible security solutions to take care of the rest of the IoT [1]. Lately, as a strong example, several thousands of network equipments were breached to proceed DOS and DDOS attacks that caused them. Solutions in info-communication are not exclusively software but the entire physical environment of hardware, World Wide Web (WWW), Software, Cloud, and mobile interfaces involved. The Cyberspace ecosystem services are getting extended and not very fully developed yet for these reasons there are main primarily concerns fact around cyberspace adoption due to security threats/attacks. Cyber-security top Concerns: Cloud jacking [7], IoT devices, Phishing attacks, DDoS, Malwares and unauthorized devices. This paper shows hybrid solutions given in a mathematical and theoretical form for mitigating cyber-attacks in info-communication system.
{"title":"A Hybrid Security Solution for Mitigating Cyber-Attacks on Info-Communication Systems","authors":"Alireza Nik Aein Koupaei, A. Nazarov","doi":"10.1109/EnT50437.2020.9431296","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431296","url":null,"abstract":"In the past, only mobiles and computers were connected to the internet but in the new era with the advent of new technologies other things like security cameras, microwaves, Databases, cars, and industrial equipment's are now connected to the internet. There are over several billion electronic equipment devices already on the internet, and within a decade these number is expected to increase massively. Info-communications have various software security solutions to defend and protect them from most of threats and attacks, although there are indiscernible security solutions to take care of the rest of the IoT [1]. Lately, as a strong example, several thousands of network equipments were breached to proceed DOS and DDOS attacks that caused them. Solutions in info-communication are not exclusively software but the entire physical environment of hardware, World Wide Web (WWW), Software, Cloud, and mobile interfaces involved. The Cyberspace ecosystem services are getting extended and not very fully developed yet for these reasons there are main primarily concerns fact around cyberspace adoption due to security threats/attacks. Cyber-security top Concerns: Cloud jacking [7], IoT devices, Phishing attacks, DDoS, Malwares and unauthorized devices. This paper shows hybrid solutions given in a mathematical and theoretical form for mitigating cyber-attacks in info-communication system.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122472797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-25DOI: 10.1109/EnT50437.2020.9431315
Khuong X. Nguyen, Stanislav Zaretsky, Stunin Dmitry
At the present time, determination the range of meteorological objects is an important task of meteolocation. Solution of this task allows to increase savefity of takeoff and landing of an aircraft. This article presents an algorithm for processing of the chirp signal, that allows to detect meteorological formation and estimate their parameters in a radar with a phased antenna array. Application of the presented algorithm will allow to provide a more complete information about the air situation in the area of responsibility of the radar.
{"title":"Algorithm for Estimating the Distance of Meteorological Target in a Airport Surveillance Radar With a Chirp Signal","authors":"Khuong X. Nguyen, Stanislav Zaretsky, Stunin Dmitry","doi":"10.1109/EnT50437.2020.9431315","DOIUrl":"https://doi.org/10.1109/EnT50437.2020.9431315","url":null,"abstract":"At the present time, determination the range of meteorological objects is an important task of meteolocation. Solution of this task allows to increase savefity of takeoff and landing of an aircraft. This article presents an algorithm for processing of the chirp signal, that allows to detect meteorological formation and estimate their parameters in a radar with a phased antenna array. Application of the presented algorithm will allow to provide a more complete information about the air situation in the area of responsibility of the radar.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}