首页 > 最新文献

Infokommunikacionnye tehnologii最新文献

英文 中文
DETERMINATION OF THE THRESHOLD SOLUTION FOR A CHANNEL WITH RAY-LEIG FADING WHEN PROBING THE COGNITIVE RADIO ENERGY DETECTOR SPECTRUM 在探测认知无线电能量探测器频谱时,确定具有射线衰落的信道的阈值解决方案
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.10
Spectrum sensor system performance and detection of spectrum band occupancy in cognitive radio are among of the main research aspects. When considering a system in which the primary user changes or there are multiple types of primary users, an energy detector is used. For energy detector operation, the main parameters that determine probabilistic characteristics of detection (probability of user detection, probability of a «false alarm» error and probability of a «missing target» error) will depend on the correct determination of the decision threshold. This article reviews an analytical approach to the normalized decision threshold determination. The purpose is to analyze and determine the optimal decision threshold value for an energy detector in a channel with Rayleigh fading. A spectrum sensing system in cognitive radio is considered. Normalized values of the threshold solution for a channel with Rayleigh fading are determined. Graphic illustrations of the analysis results and calculations are presented. Results obtained for determining threshold solutions may be considered a proper approximation for calculating the characteristics of sensing systems in cognitive radio in channels with Rayleigh fading, providing the opportunity to determine frequency bands free of primary users more likely, thereby increasing the efficiency of use of the radio frequency spectrum.
认知无线电中的频谱传感器系统性能和频带占用检测是主要研究内容之一。当系统中的主用户发生变化或存在多种类型的主用户时,就需要使用能量检测器。对于能量检测器的操作,决定检测概率特性(用户检测概率、"误报 "错误概率和 "丢失目标 "错误概率)的主要参数将取决于决策阈值的正确确定。本文回顾了确定归一化判定阈值的分析方法。其目的是分析和确定能量检测器在瑞利衰落信道中的最佳决策阈值。研究考虑了认知无线电中的频谱传感系统。确定了瑞利衰落信道中阈值解决方案的归一化值。图文并茂地展示了分析结果和计算结果。确定阈值解的结果可被视为计算认知无线电中传感系统在瑞利衰落信道中特性的适当近似值,为更有可能确定无主要用户的频段提供了机会,从而提高了无线电频谱的使用效率。
{"title":"DETERMINATION OF THE THRESHOLD SOLUTION FOR A CHANNEL WITH RAY-LEIG FADING WHEN PROBING THE COGNITIVE RADIO ENERGY DETECTOR SPECTRUM","authors":"","doi":"10.18469/ikt.2023.21.1.10","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.10","url":null,"abstract":"Spectrum sensor system performance and detection of spectrum band occupancy in cognitive radio are among of the main research aspects. When considering a system in which the primary user changes or there are multiple types of primary users, an energy detector is used. For energy detector operation, the main parameters that determine probabilistic characteristics of detection (probability of user detection, probability of a «false alarm» error and probability of a «missing target» error) will depend on the correct determination of the decision threshold. This article reviews an analytical approach to the normalized decision threshold determination. The purpose is to analyze and determine the optimal decision threshold value for an energy detector in a channel with Rayleigh fading. A spectrum sensing system in cognitive radio is considered. Normalized values of the threshold solution for a channel with Rayleigh fading are determined. Graphic illustrations of the analysis results and calculations are presented. Results obtained for determining threshold solutions may be considered a proper approximation for calculating the characteristics of sensing systems in cognitive radio in channels with Rayleigh fading, providing the opportunity to determine frequency bands free of primary users more likely, thereby increasing the efficiency of use of the radio frequency spectrum.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"33 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS 量子密码学方法和工具
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.09
Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.
网络上的安全数据交换由信息的保密性、完整性和可用性要求来保证。为满足这些要求,发送方对发送的数据进行加密,接收方对接收的信息进行解密。发送的信息根据算法和密钥确定的规则进行加密。加密信息的加密安全性取决于密钥长度。在加密算法中,有使用对称(私人)密钥的算法,也有使用非对称(公共)密钥的算法。尽管私钥有很多优点,但非对称密钥用于将其从一个用户传递给另一个用户(密钥分发)。然而,高性能量子计算机能够解密截获的数据。因此,现代密码系统使用了量子密钥分发方法。使用量子比特的想法由 S. Wiesner 于 1970 年提出。1984 年,Ch. Bennett 和 G. Brassard 提出了 BB84 协议。1991 年,A. Eckert 提出在量子密钥分配系统中使用 "纠缠 "量子。所有现代量子密码系统都基于上述协议。
{"title":"QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS","authors":"","doi":"10.18469/ikt.2023.21.1.09","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.09","url":null,"abstract":"Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"133 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BATCH ARRIVAL FLOW GENERATION ALGORITHMS 批量到达流量生成算法
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.02
The article observes algorithmic methods for a nalyzing ofqueuing systems. Software implementation is always preceded by the development of some algorithmic model of an object or process. The arsenal of algorithms combines both continuous and discrete logical functions, significantly expanding possibilities of algorithmic methods compared to analytical ones. Packet flows in multiservice telecommunication networks have a clearly expressed burst character and differ from Poisson flows significantly. The entire coherent analytic theory, which is valid for Poisson flows, unfortunately becomes unsuitable for burst flows. Real results for queuing systems with bursty flows may be obtained using simulation modeling, which requires knowledge and skills in algorithmizing of simulated processes. A software tool – a converter – is considered and examples of generating burst streams with various burst structures are presented. An analysis of algorithmic models of queuing systems for various service disciplines was conducted. The need for further development of the algorithmic theory of queuing systems is emphasized.
文章探讨了分析排队系统的算法方法。在软件实施之前,总是要先开发出某种对象或过程的算法模型。算法库结合了连续和离散逻辑函数,与分析方法相比,大大扩展了算法方法的可能性。多业务电信网络中的数据包流具有明显的突发特征,与泊松流有很大不同。整个连贯分析理论适用于泊松流,但不幸的是却不适用于突发流。可以通过模拟建模来获得突发流排队系统的真实结果,这需要模拟过程算法方面的知识和技能。本文考虑了一种软件工具--转换器,并介绍了生成具有各种突发结构的突发流的示例。对不同服务领域的排队系统算法模型进行了分析。强调了进一步发展排队系统算法理论的必要性。
{"title":"BATCH ARRIVAL FLOW GENERATION ALGORITHMS","authors":"","doi":"10.18469/ikt.2023.21.1.02","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.02","url":null,"abstract":"The article observes algorithmic methods for a nalyzing ofqueuing systems. Software implementation is always preceded by the development of some algorithmic model of an object or process. The arsenal of algorithms combines both continuous and discrete logical functions, significantly expanding possibilities of algorithmic methods compared to analytical ones. Packet flows in multiservice telecommunication networks have a clearly expressed burst character and differ from Poisson flows significantly. The entire coherent analytic theory, which is valid for Poisson flows, unfortunately becomes unsuitable for burst flows. Real results for queuing systems with bursty flows may be obtained using simulation modeling, which requires knowledge and skills in algorithmizing of simulated processes. A software tool – a converter – is considered and examples of generating burst streams with various burst structures are presented. An analysis of algorithmic models of queuing systems for various service disciplines was conducted. The need for further development of the algorithmic theory of queuing systems is emphasized.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"693 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SYSTEM REQUIREMENTS FOR TELEVISION BROADCASTING EQUIPMENT IN RUSSIA 俄罗斯电视广播设备的系统要求
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.06
The operation of uncertified broadcasting equipment located in 85 regions of Russia is the most important problem in the development of regional broadcasting networks in the absence of system requirements for network transmitters and earth stations of satellite repeaters in the «Digital Broadcasting Television. System of terrestrial terrestrial digital television broadcasting of the second generation DVB-T2. Second generation terrestrial digital television broadcasting system DVB-T2» domestic standard. Standard system requirements are the basis for actualization of requirements to the equipment during its certification. Requirements for network transmitters and earth stations of satellite repeaters in single-frequency broadcasting networks based on the author's research, published in domestic and foreign articles, protected by patents of the Russian Federation, are presented. In particular, the system requirements to the equipment for regional multiplex formation, metrological support of SFN (Single Frequency Network) operation and distributed system of DVB-T2 standard broadcasting quality monitoring are formulated. Requirements for assessing the efficiency of SFN networks, which will make it possible to further modernize existing regional networks to improve their reliability and the quality of television and radio broadcasting in all 85 regions of the Russian Federation, and to certify equipment in accordance with the resolution of the Government of the Russian Federation are also presented. The results of the author's research will make it possible to develop a system project for the creation of digital terrestrial television broadcasting in four new regions of Russia. The prospects for the development of DVB-T2 standard equipment at the program level are considered.
在 "数字广播电视 "对网络发射机和卫星中继器地面站没有系统要求的情况下,俄罗斯 85 个地区未经认证的广播设备的运行是地区广播网络发展中最重要的问题。第二代地面数字电视广播系统 DVB-T2。第二代地面数字电视广播系统 DVB-T2 "国内标准。标准系统要求是在设备认证过程中实现对设备要求的基础。本文介绍了单频广播网络中对网络发射机和卫星中继器地面站的要求,这些要求基于作者的研究,已在国内外文章中发表,并受俄罗斯联邦专利保护。特别是对区域多路复用形成设备、SFN(单频网)运行的计量支持和 DVB-T2 标准广播质量监测的分布式系统提出了系统要求。还提出了评估 SFN 网络效率的要求,这将使现有地区网络进一步现代化,以提高其可靠性和俄罗斯联邦所有 85 个地区的电视和广播质量,并根据俄罗斯联邦政府的决议对设备进行认证。作者的研究成果将为在俄罗斯四个新地区建立地面数字电视广播系统项目提供可能。作者还考虑了在节目层面开发 DVB-T2 标准设备的前景。
{"title":"SYSTEM REQUIREMENTS FOR TELEVISION BROADCASTING EQUIPMENT IN RUSSIA","authors":"","doi":"10.18469/ikt.2023.21.1.06","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.06","url":null,"abstract":"The operation of uncertified broadcasting equipment located in 85 regions of Russia is the most important problem in the development of regional broadcasting networks in the absence of system requirements for network transmitters and earth stations of satellite repeaters in the «Digital Broadcasting Television. System of terrestrial terrestrial digital television broadcasting of the second generation DVB-T2. Second generation terrestrial digital television broadcasting system DVB-T2» domestic standard. Standard system requirements are the basis for actualization of requirements to the equipment during its certification. Requirements for network transmitters and earth stations of satellite repeaters in single-frequency broadcasting networks based on the author's research, published in domestic and foreign articles, protected by patents of the Russian Federation, are presented. In particular, the system requirements to the equipment for regional multiplex formation, metrological support of SFN (Single Frequency Network) operation and distributed system of DVB-T2 standard broadcasting quality monitoring are formulated. Requirements for assessing the efficiency of SFN networks, which will make it possible to further modernize existing regional networks to improve their reliability and the quality of television and radio broadcasting in all 85 regions of the Russian Federation, and to certify equipment in accordance with the resolution of the Government of the Russian Federation are also presented. The results of the author's research will make it possible to develop a system project for the creation of digital terrestrial television broadcasting in four new regions of Russia. The prospects for the development of DVB-T2 standard equipment at the program level are considered.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"4 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NUMERICAL METHOD FOR CALCULATING THE LOCATIONS OF SAFETY SYSTEM REPEATERS ON TERRAIN WITH OBSTACLES 计算有障碍物地形上安全系统中继器位置的数值方法
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.07
When deploying temporary technical security systems in the interests of ensuring public safety during mass events, quick-deployable sensors for detecting dangerous events are widely used: to monitor traffic flows and visitors, to detect fires, fights, aggressive behavior, dangerous abandoned objects and unmanned aerial vehicles. A number of important limitations, including geometric dimensions of the detector and repeater installation areas, the capacity of data transmission channels, the presence of restricted areas and the high speed of data transmission from modern sensors of dangerous events, show the need for rational location of repeaters. An iterative algorithm used to estimate placement locations provides an opportunity to find repeater installation points in order to ensure the transmission of high-speed monitoring information flows.
为了确保大规模活动期间的公共安全,在部署临时技术安全系统时,广泛使用了用于探测危险事件的快速部署传感器:监测交通流量和游客,探测火灾、斗殴、攻击行为、危险废弃物和无人驾驶飞行器。探测器和中继器安装区域的几何尺寸、数据传输通道的容量、禁区的存在以及现代危险事件传感器的高速数据传输等一系列重要限制因素表明,需要合理确定中继器的位置。用于估算安装位置的迭代算法为找到中继器安装点提供了机会,以确保高速监测信息流的传输。
{"title":"NUMERICAL METHOD FOR CALCULATING THE LOCATIONS OF SAFETY SYSTEM REPEATERS ON TERRAIN WITH OBSTACLES","authors":"","doi":"10.18469/ikt.2023.21.1.07","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.07","url":null,"abstract":"When deploying temporary technical security systems in the interests of ensuring public safety during mass events, quick-deployable sensors for detecting dangerous events are widely used: to monitor traffic flows and visitors, to detect fires, fights, aggressive behavior, dangerous abandoned objects and unmanned aerial vehicles. A number of important limitations, including geometric dimensions of the detector and repeater installation areas, the capacity of data transmission channels, the presence of restricted areas and the high speed of data transmission from modern sensors of dangerous events, show the need for rational location of repeaters. An iterative algorithm used to estimate placement locations provides an opportunity to find repeater installation points in order to ensure the transmission of high-speed monitoring information flows.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"975 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DISTRIBUTED ARTIFICIAL INTELLIGENCE MODELS IN PERSPECTIVE COMMUNICATION NETWORKS 透视通信网络中的分布式人工智能模型
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.08
6G technology will create an intelligent, highly scalable, dynamic and programmable wireless network capable of serving a variety of heterogeneous wireless devices. Various 6G modules and devices will generate colossal amounts of distributed data, so post-NGN (New Generation Networks) will need to implement a number of machine learning methods that will solve significantly complicated network problems. To overcome these problems, distributed learning methods can be used, allowing devices to train models jointly, without exchanging raw data, which reduces communication costs, delays, and increases data privacy level as well. Distributed machine learning models will play an important role in 6G networks, since they have a number of advantages over centralized methods, however, the implementation of distributed algorithms in resource-constrained wireless environments can be challenging. It is important to take into account the wireless environment uncertainty associated with various disturbing factors and limited wireless (transmission power, radio frequency spectrum) and hardware resources (computing power). Consequently, it is important to choose the suitable machine learning algorithm based on the wireless environment characteristics and the resource requirements of the learning process. The article reviews the application of distributed artificial intelligence models in new generation communication networks for resource management and data processing purposes. The general algorithms and approaches of distributed machine learning, applications, methods and models are described. The article analyzes the ways in which distributed artificial intelligence models can solve various problems in communication networks, including optimizing resource use and ensuring high performance and availability of network services.
6G 技术将创建一个智能、高度可扩展、动态和可编程的无线网络,能够为各种异构无线设备提供服务。各种 6G 模块和设备将产生巨量的分布式数据,因此后 NGN(新一代网络)将需要实施大量机器学习方法,以解决极其复杂的网络问题。为了克服这些问题,可以采用分布式学习方法,让设备在不交换原始数据的情况下联合训练模型,从而降低通信成本和延迟,并提高数据隐私水平。分布式机器学习模型将在 6G 网络中发挥重要作用,因为与集中式方法相比,它们具有许多优势,但在资源受限的无线环境中实施分布式算法可能具有挑战性。必须考虑到与各种干扰因素和有限的无线(传输功率、射频频谱)和硬件资源(计算能力)相关的无线环境不确定性。因此,根据无线环境特征和学习过程的资源要求选择合适的机器学习算法非常重要。本文综述了分布式人工智能模型在新一代通信网络中的应用,以达到资源管理和数据处理的目的。文章介绍了分布式机器学习的一般算法和方法、应用、方法和模型。文章分析了分布式人工智能模型解决通信网络中各种问题的方法,包括优化资源使用和确保网络服务的高性能和可用性。
{"title":"DISTRIBUTED ARTIFICIAL INTELLIGENCE MODELS IN PERSPECTIVE COMMUNICATION NETWORKS","authors":"","doi":"10.18469/ikt.2023.21.1.08","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.08","url":null,"abstract":"6G technology will create an intelligent, highly scalable, dynamic and programmable wireless network capable of serving a variety of heterogeneous wireless devices. Various 6G modules and devices will generate colossal amounts of distributed data, so post-NGN (New Generation Networks) will need to implement a number of machine learning methods that will solve significantly complicated network problems. To overcome these problems, distributed learning methods can be used, allowing devices to train models jointly, without exchanging raw data, which reduces communication costs, delays, and increases data privacy level as well. Distributed machine learning models will play an important role in 6G networks, since they have a number of advantages over centralized methods, however, the implementation of distributed algorithms in resource-constrained wireless environments can be challenging. It is important to take into account the wireless environment uncertainty associated with various disturbing factors and limited wireless (transmission power, radio frequency spectrum) and hardware resources (computing power). Consequently, it is important to choose the suitable machine learning algorithm based on the wireless environment characteristics and the resource requirements of the learning process. The article reviews the application of distributed artificial intelligence models in new generation communication networks for resource management and data processing purposes. The general algorithms and approaches of distributed machine learning, applications, methods and models are described. The article analyzes the ways in which distributed artificial intelligence models can solve various problems in communication networks, including optimizing resource use and ensuring high performance and availability of network services.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"311 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138985860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BLIND IDENTIFIABILITY OF A LINEAR DYNAMIC COMMUNICATION CHANNEL MODEL 线性动态通信信道模型的盲可识别性
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.03
The article describes the problem of developing a mathematical model of data transmission channel in communication systems in the case when signals at the channel input channel are unknown at the channel output. Development of mathematical models directly from observed data constitutes an identification problem, and the case under consideration belongs to the blind identification problem. The work consistently examines the concept of linear dynamic system identifiability in state space and shows the connection of this concept with the observability and controllability concepts. A number of statements about identifiability of a linear dynamic system describing communication channel are proved. In particular, it is shown that if the system is identifiable, it is sufficient to use the input-output model for its description, while the input-state-output model is redundant. Further, based on the proven statements, blind identifiability conditions are formulated for the case of a discrete system with one input and multiple outputs, which are imposed on the components of the system’s transfer matrix.
文章介绍了在信道输入信道的信号在信道输出端未知的情况下建立通信系统数据传输信道数学模型的问题。直接从观测数据建立数学模型构成了一个识别问题,而我们所考虑的情况属于盲识别问题。该著作始终研究状态空间中线性动态系统可识别性的概念,并展示了这一概念与可观测性和可控性概念之间的联系。研究证明了描述通信信道的线性动态系统的可识别性的一系列陈述。特别是,证明了如果系统是可识别的,那么使用输入-输出模型来描述该系统就足够了,而输入-状态-输出模型则是多余的。此外,根据已证明的陈述,还为具有一个输入和多个输出的离散系统的情况制定了盲可识别性条件,这些条件施加于系统传递矩阵的分量上。
{"title":"BLIND IDENTIFIABILITY OF A LINEAR DYNAMIC COMMUNICATION CHANNEL MODEL","authors":"","doi":"10.18469/ikt.2023.21.1.03","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.03","url":null,"abstract":"The article describes the problem of developing a mathematical model of data transmission channel in communication systems in the case when signals at the channel input channel are unknown at the channel output. Development of mathematical models directly from observed data constitutes an identification problem, and the case under consideration belongs to the blind identification problem. The work consistently examines the concept of linear dynamic system identifiability in state space and shows the connection of this concept with the observability and controllability concepts. A number of statements about identifiability of a linear dynamic system describing communication channel are proved. In particular, it is shown that if the system is identifiable, it is sufficient to use the input-output model for its description, while the input-state-output model is redundant. Further, based on the proven statements, blind identifiability conditions are formulated for the case of a discrete system with one input and multiple outputs, which are imposed on the components of the system’s transfer matrix.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"819 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
METHOD OF ITERATIVE COMBINATION OF TV SIGNALS BASED ON LINEARIZATION FOR MACHINE VISION SYSTEMS 基于线性化的机器视觉系统电视信号迭代组合方法
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.11
The article describes a method for combining television signals for machine vision systems based on linearization. The relevance of the developed method involves reducing the error when combining signals in the presence of interference arising from changes in illumination, as well as ensuring high processing speed. It is shown that the idea of combination replaces the processing signals of trigonometric functions in the model with a Taylor series, and in adding two variables to the model – additive and multiplicative components. All matching parameters are evaluated by solving a system of linear equations, which is determined by decomposing the matched signal into a Taylor series. An experiment demonstrated the correct combination of television signals using the proposed method, and a comparison was made with the exhaustive search method in terms of measurement error and processing speed. It is noted that the work will be useful for developers of machine vision measurement systems with real time processing.
文章介绍了一种基于线性化的机器视觉系统电视信号组合方法。所开发方法的意义在于,在光照变化产生干扰的情况下,减少信号组合时的误差,并确保较高的处理速度。研究表明,组合的理念是在模型中用泰勒级数代替三角函数的处理信号,并在模型中添加两个变量--加法和乘法成分。所有匹配参数都通过求解线性方程组来评估,而线性方程组是通过将匹配信号分解为泰勒级数来确定的。实验证明,使用所提出的方法可以正确组合电视信号,并在测量误差和处理速度方面与穷举搜索法进行了比较。这项工作将对实时处理机器视觉测量系统的开发人员有所帮助。
{"title":"METHOD OF ITERATIVE COMBINATION OF TV SIGNALS BASED ON LINEARIZATION FOR MACHINE VISION SYSTEMS","authors":"","doi":"10.18469/ikt.2023.21.1.11","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.11","url":null,"abstract":"The article describes a method for combining television signals for machine vision systems based on linearization. The relevance of the developed method involves reducing the error when combining signals in the presence of interference arising from changes in illumination, as well as ensuring high processing speed. It is shown that the idea of combination replaces the processing signals of trigonometric functions in the model with a Taylor series, and in adding two variables to the model – additive and multiplicative components. All matching parameters are evaluated by solving a system of linear equations, which is determined by decomposing the matched signal into a Taylor series. An experiment demonstrated the correct combination of television signals using the proposed method, and a comparison was made with the exhaustive search method in terms of measurement error and processing speed. It is noted that the work will be useful for developers of machine vision measurement systems with real time processing.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"306 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVELOPMENT AND RESEARCH OF THE BAN NETWORK LAYOUT FOR HUMAN HEALTH MONITORING 开发和研究用于人体健康监测的禁令网络布局
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.04
This article describes the development of a real BAN (Body Area Network) network layout for human health monitoring. BAN networks can help improve life quality of people suffering from various diseases, such as diabetes, cardiovascular diseases and others. They are accessible to wide range of users, including people with disabilities and the elderly. They can also provide a high level of security, since they use data encryption and user authentication. These networks may be easily configured and adapted to the needs of a particular user. The article presents results of studies that show state of the human health under various conditions. Thanks to the developed BAN network layout, it is possible not only to study the condition of human health in practice, but also to use it for scientific research at universities.
本文介绍了用于人体健康监测的真实 BAN(体域网)网络布局的开发情况。BAN 网络有助于提高糖尿病、心血管疾病等各种疾病患者的生活质量。包括残疾人和老年人在内的广大用户都可以使用这些网络。由于采用了数据加密和用户身份验证,它们还能提供高度的安全性。这些网络可以很容易地进行配置和调整,以满足特定用户的需求。文章介绍了显示各种条件下人类健康状况的研究结果。由于开发了 BAN 网络布局,因此不仅可以在实践中研究人类健康状况,还可以将其用于大学的科学研究。
{"title":"DEVELOPMENT AND RESEARCH OF THE BAN NETWORK LAYOUT FOR HUMAN HEALTH MONITORING","authors":"","doi":"10.18469/ikt.2023.21.1.04","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.04","url":null,"abstract":"This article describes the development of a real BAN (Body Area Network) network layout for human health monitoring. BAN networks can help improve life quality of people suffering from various diseases, such as diabetes, cardiovascular diseases and others. They are accessible to wide range of users, including people with disabilities and the elderly. They can also provide a high level of security, since they use data encryption and user authentication. These networks may be easily configured and adapted to the needs of a particular user. The article presents results of studies that show state of the human health under various conditions. Thanks to the developed BAN network layout, it is possible not only to study the condition of human health in practice, but also to use it for scientific research at universities.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"116 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVELOPMENT OF A DSS MODULE WHEN PREPARING ASSESSMENTS FOR IT COMPANY CLIENTS 在为 IT 公司客户准备评估时开发 DSS 模块
Pub Date : 2023-12-01 DOI: 10.18469/ikt.2023.21.1.12
The article considers the relevance of the search for toolkit for objective software development complexity and timing assessment. The key purpose of this toolkit is to provide an IT company with the opportunity to objectively assess the labor intensity, the cost of a future software product at an early stage, on the one hand, and to ensure transparency in justifying an acceptable transaction price for the customer, on the other hand. A special feature of the IT industry is the intangible nature of the created product and, as a result, the challenge of choosing methods (metrics) for labor intensity assessment and predicting the timing of the software product implementation, which allows obtaining realistic data without serious time and financial costs, poses a certain difficulty. The results of the analysis and comparison of the most common methods of software development complexity assessment (in particular, IFPUG, UCP, COCOMOII, etc.), including identification of advantages and limitations, are presented. A generalized algorithm for the decision support system operation is proposed to reduce time and increase the validity of calculations when drawing up estimates by an IT company analyst as a part of the preparation of technical specifications. A description of individual screen forms of the decision support system designed module is provided.
文章探讨了寻找客观软件开发复杂性和时间评估工具包的意义。该工具包的主要目的是,一方面为 IT 公司提供机会,在早期阶段对未来软件产品的劳动强度和成本进行客观评估,另一方面确保透明度,为客户提供可接受的交易价格。IT 行业的一个特点是所创造产品的无形性,因此,选择劳动强度评估方法(指标)和预测软件产品的实施时间,以便在不花费大量时间和资金的情况下获得真实数据,就构成了一定的困难。本文介绍了对最常用的软件开发复杂性评估方法(特别是 IFPUG、UCP、COCOMOII 等)的分析和比较结果,包括优势和局限性的识别。提出了决策支持系统操作的通用算法,以减少 IT 公司分析师在编制技术规范时进行估算的时间并提高计算的有效性。介绍了决策支持系统设计模块的各个屏幕形式。
{"title":"DEVELOPMENT OF A DSS MODULE WHEN PREPARING ASSESSMENTS FOR IT COMPANY CLIENTS","authors":"","doi":"10.18469/ikt.2023.21.1.12","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.12","url":null,"abstract":"The article considers the relevance of the search for toolkit for objective software development complexity and timing assessment. The key purpose of this toolkit is to provide an IT company with the opportunity to objectively assess the labor intensity, the cost of a future software product at an early stage, on the one hand, and to ensure transparency in justifying an acceptable transaction price for the customer, on the other hand. A special feature of the IT industry is the intangible nature of the created product and, as a result, the challenge of choosing methods (metrics) for labor intensity assessment and predicting the timing of the software product implementation, which allows obtaining realistic data without serious time and financial costs, poses a certain difficulty. The results of the analysis and comparison of the most common methods of software development complexity assessment (in particular, IFPUG, UCP, COCOMOII, etc.), including identification of advantages and limitations, are presented. A generalized algorithm for the decision support system operation is proposed to reduce time and increase the validity of calculations when drawing up estimates by an IT company analyst as a part of the preparation of technical specifications. A description of individual screen forms of the decision support system designed module is provided.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"380 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infokommunikacionnye tehnologii
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1