Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.10
Spectrum sensor system performance and detection of spectrum band occupancy in cognitive radio are among of the main research aspects. When considering a system in which the primary user changes or there are multiple types of primary users, an energy detector is used. For energy detector operation, the main parameters that determine probabilistic characteristics of detection (probability of user detection, probability of a «false alarm» error and probability of a «missing target» error) will depend on the correct determination of the decision threshold. This article reviews an analytical approach to the normalized decision threshold determination. The purpose is to analyze and determine the optimal decision threshold value for an energy detector in a channel with Rayleigh fading. A spectrum sensing system in cognitive radio is considered. Normalized values of the threshold solution for a channel with Rayleigh fading are determined. Graphic illustrations of the analysis results and calculations are presented. Results obtained for determining threshold solutions may be considered a proper approximation for calculating the characteristics of sensing systems in cognitive radio in channels with Rayleigh fading, providing the opportunity to determine frequency bands free of primary users more likely, thereby increasing the efficiency of use of the radio frequency spectrum.
{"title":"DETERMINATION OF THE THRESHOLD SOLUTION FOR A CHANNEL WITH RAY-LEIG FADING WHEN PROBING THE COGNITIVE RADIO ENERGY DETECTOR SPECTRUM","authors":"","doi":"10.18469/ikt.2023.21.1.10","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.10","url":null,"abstract":"Spectrum sensor system performance and detection of spectrum band occupancy in cognitive radio are among of the main research aspects. When considering a system in which the primary user changes or there are multiple types of primary users, an energy detector is used. For energy detector operation, the main parameters that determine probabilistic characteristics of detection (probability of user detection, probability of a «false alarm» error and probability of a «missing target» error) will depend on the correct determination of the decision threshold. This article reviews an analytical approach to the normalized decision threshold determination. The purpose is to analyze and determine the optimal decision threshold value for an energy detector in a channel with Rayleigh fading. A spectrum sensing system in cognitive radio is considered. Normalized values of the threshold solution for a channel with Rayleigh fading are determined. Graphic illustrations of the analysis results and calculations are presented. Results obtained for determining threshold solutions may be considered a proper approximation for calculating the characteristics of sensing systems in cognitive radio in channels with Rayleigh fading, providing the opportunity to determine frequency bands free of primary users more likely, thereby increasing the efficiency of use of the radio frequency spectrum.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"33 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.09
Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.
网络上的安全数据交换由信息的保密性、完整性和可用性要求来保证。为满足这些要求,发送方对发送的数据进行加密,接收方对接收的信息进行解密。发送的信息根据算法和密钥确定的规则进行加密。加密信息的加密安全性取决于密钥长度。在加密算法中,有使用对称(私人)密钥的算法,也有使用非对称(公共)密钥的算法。尽管私钥有很多优点,但非对称密钥用于将其从一个用户传递给另一个用户(密钥分发)。然而,高性能量子计算机能够解密截获的数据。因此,现代密码系统使用了量子密钥分发方法。使用量子比特的想法由 S. Wiesner 于 1970 年提出。1984 年,Ch. Bennett 和 G. Brassard 提出了 BB84 协议。1991 年,A. Eckert 提出在量子密钥分配系统中使用 "纠缠 "量子。所有现代量子密码系统都基于上述协议。
{"title":"QUANTUM CRYPTOGRAPHY METHODS AND INSTRUMENTS","authors":"","doi":"10.18469/ikt.2023.21.1.09","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.09","url":null,"abstract":"Secure data exchange over the network is ensured by the requirements of confidentiality, integrity and availability of information. To meet these requirements, sent data is encrypted on the sending side, and the received information is decrypted on the receiving side. Transmitted message is encrypted according to rules determined by the algorithm and key. Crypto security of encrypted information depends on the key length. Among the encryption algorithms, there are algorithms with a symmetric (private) key and with an asymmetric (public) key. Despite all the advantages of a private key, asymmetric keys are used to deliver it from one user to another (key distribution). However, high-performance quantum computers are capable to decrypt intercepted data. Therefore, modern cryptographic systems use quantum key distribution method. The idea of using quantum bits was proposed in 1970 by S. Wiesner. In 1984, Ch. Bennett and G. Brassard proposed the BB84 protocol. The use of «entangled » quanta for systems with quantum key distribution was offerred in 1991 by A. Eckert. All modern quantum cryptography systems are based on these above-mentioned protocols.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"133 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.02
The article observes algorithmic methods for a nalyzing ofqueuing systems. Software implementation is always preceded by the development of some algorithmic model of an object or process. The arsenal of algorithms combines both continuous and discrete logical functions, significantly expanding possibilities of algorithmic methods compared to analytical ones. Packet flows in multiservice telecommunication networks have a clearly expressed burst character and differ from Poisson flows significantly. The entire coherent analytic theory, which is valid for Poisson flows, unfortunately becomes unsuitable for burst flows. Real results for queuing systems with bursty flows may be obtained using simulation modeling, which requires knowledge and skills in algorithmizing of simulated processes. A software tool – a converter – is considered and examples of generating burst streams with various burst structures are presented. An analysis of algorithmic models of queuing systems for various service disciplines was conducted. The need for further development of the algorithmic theory of queuing systems is emphasized.
{"title":"BATCH ARRIVAL FLOW GENERATION ALGORITHMS","authors":"","doi":"10.18469/ikt.2023.21.1.02","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.02","url":null,"abstract":"The article observes algorithmic methods for a nalyzing ofqueuing systems. Software implementation is always preceded by the development of some algorithmic model of an object or process. The arsenal of algorithms combines both continuous and discrete logical functions, significantly expanding possibilities of algorithmic methods compared to analytical ones. Packet flows in multiservice telecommunication networks have a clearly expressed burst character and differ from Poisson flows significantly. The entire coherent analytic theory, which is valid for Poisson flows, unfortunately becomes unsuitable for burst flows. Real results for queuing systems with bursty flows may be obtained using simulation modeling, which requires knowledge and skills in algorithmizing of simulated processes. A software tool – a converter – is considered and examples of generating burst streams with various burst structures are presented. An analysis of algorithmic models of queuing systems for various service disciplines was conducted. The need for further development of the algorithmic theory of queuing systems is emphasized.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"693 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.06
The operation of uncertified broadcasting equipment located in 85 regions of Russia is the most important problem in the development of regional broadcasting networks in the absence of system requirements for network transmitters and earth stations of satellite repeaters in the «Digital Broadcasting Television. System of terrestrial terrestrial digital television broadcasting of the second generation DVB-T2. Second generation terrestrial digital television broadcasting system DVB-T2» domestic standard. Standard system requirements are the basis for actualization of requirements to the equipment during its certification. Requirements for network transmitters and earth stations of satellite repeaters in single-frequency broadcasting networks based on the author's research, published in domestic and foreign articles, protected by patents of the Russian Federation, are presented. In particular, the system requirements to the equipment for regional multiplex formation, metrological support of SFN (Single Frequency Network) operation and distributed system of DVB-T2 standard broadcasting quality monitoring are formulated. Requirements for assessing the efficiency of SFN networks, which will make it possible to further modernize existing regional networks to improve their reliability and the quality of television and radio broadcasting in all 85 regions of the Russian Federation, and to certify equipment in accordance with the resolution of the Government of the Russian Federation are also presented. The results of the author's research will make it possible to develop a system project for the creation of digital terrestrial television broadcasting in four new regions of Russia. The prospects for the development of DVB-T2 standard equipment at the program level are considered.
{"title":"SYSTEM REQUIREMENTS FOR TELEVISION BROADCASTING EQUIPMENT IN RUSSIA","authors":"","doi":"10.18469/ikt.2023.21.1.06","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.06","url":null,"abstract":"The operation of uncertified broadcasting equipment located in 85 regions of Russia is the most important problem in the development of regional broadcasting networks in the absence of system requirements for network transmitters and earth stations of satellite repeaters in the «Digital Broadcasting Television. System of terrestrial terrestrial digital television broadcasting of the second generation DVB-T2. Second generation terrestrial digital television broadcasting system DVB-T2» domestic standard. Standard system requirements are the basis for actualization of requirements to the equipment during its certification. Requirements for network transmitters and earth stations of satellite repeaters in single-frequency broadcasting networks based on the author's research, published in domestic and foreign articles, protected by patents of the Russian Federation, are presented. In particular, the system requirements to the equipment for regional multiplex formation, metrological support of SFN (Single Frequency Network) operation and distributed system of DVB-T2 standard broadcasting quality monitoring are formulated. Requirements for assessing the efficiency of SFN networks, which will make it possible to further modernize existing regional networks to improve their reliability and the quality of television and radio broadcasting in all 85 regions of the Russian Federation, and to certify equipment in accordance with the resolution of the Government of the Russian Federation are also presented. The results of the author's research will make it possible to develop a system project for the creation of digital terrestrial television broadcasting in four new regions of Russia. The prospects for the development of DVB-T2 standard equipment at the program level are considered.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"4 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.07
When deploying temporary technical security systems in the interests of ensuring public safety during mass events, quick-deployable sensors for detecting dangerous events are widely used: to monitor traffic flows and visitors, to detect fires, fights, aggressive behavior, dangerous abandoned objects and unmanned aerial vehicles. A number of important limitations, including geometric dimensions of the detector and repeater installation areas, the capacity of data transmission channels, the presence of restricted areas and the high speed of data transmission from modern sensors of dangerous events, show the need for rational location of repeaters. An iterative algorithm used to estimate placement locations provides an opportunity to find repeater installation points in order to ensure the transmission of high-speed monitoring information flows.
{"title":"NUMERICAL METHOD FOR CALCULATING THE LOCATIONS OF SAFETY SYSTEM REPEATERS ON TERRAIN WITH OBSTACLES","authors":"","doi":"10.18469/ikt.2023.21.1.07","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.07","url":null,"abstract":"When deploying temporary technical security systems in the interests of ensuring public safety during mass events, quick-deployable sensors for detecting dangerous events are widely used: to monitor traffic flows and visitors, to detect fires, fights, aggressive behavior, dangerous abandoned objects and unmanned aerial vehicles. A number of important limitations, including geometric dimensions of the detector and repeater installation areas, the capacity of data transmission channels, the presence of restricted areas and the high speed of data transmission from modern sensors of dangerous events, show the need for rational location of repeaters. An iterative algorithm used to estimate placement locations provides an opportunity to find repeater installation points in order to ensure the transmission of high-speed monitoring information flows.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"975 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.08
6G technology will create an intelligent, highly scalable, dynamic and programmable wireless network capable of serving a variety of heterogeneous wireless devices. Various 6G modules and devices will generate colossal amounts of distributed data, so post-NGN (New Generation Networks) will need to implement a number of machine learning methods that will solve significantly complicated network problems. To overcome these problems, distributed learning methods can be used, allowing devices to train models jointly, without exchanging raw data, which reduces communication costs, delays, and increases data privacy level as well. Distributed machine learning models will play an important role in 6G networks, since they have a number of advantages over centralized methods, however, the implementation of distributed algorithms in resource-constrained wireless environments can be challenging. It is important to take into account the wireless environment uncertainty associated with various disturbing factors and limited wireless (transmission power, radio frequency spectrum) and hardware resources (computing power). Consequently, it is important to choose the suitable machine learning algorithm based on the wireless environment characteristics and the resource requirements of the learning process. The article reviews the application of distributed artificial intelligence models in new generation communication networks for resource management and data processing purposes. The general algorithms and approaches of distributed machine learning, applications, methods and models are described. The article analyzes the ways in which distributed artificial intelligence models can solve various problems in communication networks, including optimizing resource use and ensuring high performance and availability of network services.
{"title":"DISTRIBUTED ARTIFICIAL INTELLIGENCE MODELS IN PERSPECTIVE COMMUNICATION NETWORKS","authors":"","doi":"10.18469/ikt.2023.21.1.08","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.08","url":null,"abstract":"6G technology will create an intelligent, highly scalable, dynamic and programmable wireless network capable of serving a variety of heterogeneous wireless devices. Various 6G modules and devices will generate colossal amounts of distributed data, so post-NGN (New Generation Networks) will need to implement a number of machine learning methods that will solve significantly complicated network problems. To overcome these problems, distributed learning methods can be used, allowing devices to train models jointly, without exchanging raw data, which reduces communication costs, delays, and increases data privacy level as well. Distributed machine learning models will play an important role in 6G networks, since they have a number of advantages over centralized methods, however, the implementation of distributed algorithms in resource-constrained wireless environments can be challenging. It is important to take into account the wireless environment uncertainty associated with various disturbing factors and limited wireless (transmission power, radio frequency spectrum) and hardware resources (computing power). Consequently, it is important to choose the suitable machine learning algorithm based on the wireless environment characteristics and the resource requirements of the learning process. The article reviews the application of distributed artificial intelligence models in new generation communication networks for resource management and data processing purposes. The general algorithms and approaches of distributed machine learning, applications, methods and models are described. The article analyzes the ways in which distributed artificial intelligence models can solve various problems in communication networks, including optimizing resource use and ensuring high performance and availability of network services.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"311 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138985860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.03
The article describes the problem of developing a mathematical model of data transmission channel in communication systems in the case when signals at the channel input channel are unknown at the channel output. Development of mathematical models directly from observed data constitutes an identification problem, and the case under consideration belongs to the blind identification problem. The work consistently examines the concept of linear dynamic system identifiability in state space and shows the connection of this concept with the observability and controllability concepts. A number of statements about identifiability of a linear dynamic system describing communication channel are proved. In particular, it is shown that if the system is identifiable, it is sufficient to use the input-output model for its description, while the input-state-output model is redundant. Further, based on the proven statements, blind identifiability conditions are formulated for the case of a discrete system with one input and multiple outputs, which are imposed on the components of the system’s transfer matrix.
{"title":"BLIND IDENTIFIABILITY OF A LINEAR DYNAMIC COMMUNICATION CHANNEL MODEL","authors":"","doi":"10.18469/ikt.2023.21.1.03","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.03","url":null,"abstract":"The article describes the problem of developing a mathematical model of data transmission channel in communication systems in the case when signals at the channel input channel are unknown at the channel output. Development of mathematical models directly from observed data constitutes an identification problem, and the case under consideration belongs to the blind identification problem. The work consistently examines the concept of linear dynamic system identifiability in state space and shows the connection of this concept with the observability and controllability concepts. A number of statements about identifiability of a linear dynamic system describing communication channel are proved. In particular, it is shown that if the system is identifiable, it is sufficient to use the input-output model for its description, while the input-state-output model is redundant. Further, based on the proven statements, blind identifiability conditions are formulated for the case of a discrete system with one input and multiple outputs, which are imposed on the components of the system’s transfer matrix.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"819 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139018629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.11
The article describes a method for combining television signals for machine vision systems based on linearization. The relevance of the developed method involves reducing the error when combining signals in the presence of interference arising from changes in illumination, as well as ensuring high processing speed. It is shown that the idea of combination replaces the processing signals of trigonometric functions in the model with a Taylor series, and in adding two variables to the model – additive and multiplicative components. All matching parameters are evaluated by solving a system of linear equations, which is determined by decomposing the matched signal into a Taylor series. An experiment demonstrated the correct combination of television signals using the proposed method, and a comparison was made with the exhaustive search method in terms of measurement error and processing speed. It is noted that the work will be useful for developers of machine vision measurement systems with real time processing.
{"title":"METHOD OF ITERATIVE COMBINATION OF TV SIGNALS BASED ON LINEARIZATION FOR MACHINE VISION SYSTEMS","authors":"","doi":"10.18469/ikt.2023.21.1.11","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.11","url":null,"abstract":"The article describes a method for combining television signals for machine vision systems based on linearization. The relevance of the developed method involves reducing the error when combining signals in the presence of interference arising from changes in illumination, as well as ensuring high processing speed. It is shown that the idea of combination replaces the processing signals of trigonometric functions in the model with a Taylor series, and in adding two variables to the model – additive and multiplicative components. All matching parameters are evaluated by solving a system of linear equations, which is determined by decomposing the matched signal into a Taylor series. An experiment demonstrated the correct combination of television signals using the proposed method, and a comparison was made with the exhaustive search method in terms of measurement error and processing speed. It is noted that the work will be useful for developers of machine vision measurement systems with real time processing.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"306 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.04
This article describes the development of a real BAN (Body Area Network) network layout for human health monitoring. BAN networks can help improve life quality of people suffering from various diseases, such as diabetes, cardiovascular diseases and others. They are accessible to wide range of users, including people with disabilities and the elderly. They can also provide a high level of security, since they use data encryption and user authentication. These networks may be easily configured and adapted to the needs of a particular user. The article presents results of studies that show state of the human health under various conditions. Thanks to the developed BAN network layout, it is possible not only to study the condition of human health in practice, but also to use it for scientific research at universities.
本文介绍了用于人体健康监测的真实 BAN(体域网)网络布局的开发情况。BAN 网络有助于提高糖尿病、心血管疾病等各种疾病患者的生活质量。包括残疾人和老年人在内的广大用户都可以使用这些网络。由于采用了数据加密和用户身份验证,它们还能提供高度的安全性。这些网络可以很容易地进行配置和调整,以满足特定用户的需求。文章介绍了显示各种条件下人类健康状况的研究结果。由于开发了 BAN 网络布局,因此不仅可以在实践中研究人类健康状况,还可以将其用于大学的科学研究。
{"title":"DEVELOPMENT AND RESEARCH OF THE BAN NETWORK LAYOUT FOR HUMAN HEALTH MONITORING","authors":"","doi":"10.18469/ikt.2023.21.1.04","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.04","url":null,"abstract":"This article describes the development of a real BAN (Body Area Network) network layout for human health monitoring. BAN networks can help improve life quality of people suffering from various diseases, such as diabetes, cardiovascular diseases and others. They are accessible to wide range of users, including people with disabilities and the elderly. They can also provide a high level of security, since they use data encryption and user authentication. These networks may be easily configured and adapted to the needs of a particular user. The article presents results of studies that show state of the human health under various conditions. Thanks to the developed BAN network layout, it is possible not only to study the condition of human health in practice, but also to use it for scientific research at universities.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"116 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139023128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-01DOI: 10.18469/ikt.2023.21.1.12
The article considers the relevance of the search for toolkit for objective software development complexity and timing assessment. The key purpose of this toolkit is to provide an IT company with the opportunity to objectively assess the labor intensity, the cost of a future software product at an early stage, on the one hand, and to ensure transparency in justifying an acceptable transaction price for the customer, on the other hand. A special feature of the IT industry is the intangible nature of the created product and, as a result, the challenge of choosing methods (metrics) for labor intensity assessment and predicting the timing of the software product implementation, which allows obtaining realistic data without serious time and financial costs, poses a certain difficulty. The results of the analysis and comparison of the most common methods of software development complexity assessment (in particular, IFPUG, UCP, COCOMOII, etc.), including identification of advantages and limitations, are presented. A generalized algorithm for the decision support system operation is proposed to reduce time and increase the validity of calculations when drawing up estimates by an IT company analyst as a part of the preparation of technical specifications. A description of individual screen forms of the decision support system designed module is provided.
文章探讨了寻找客观软件开发复杂性和时间评估工具包的意义。该工具包的主要目的是,一方面为 IT 公司提供机会,在早期阶段对未来软件产品的劳动强度和成本进行客观评估,另一方面确保透明度,为客户提供可接受的交易价格。IT 行业的一个特点是所创造产品的无形性,因此,选择劳动强度评估方法(指标)和预测软件产品的实施时间,以便在不花费大量时间和资金的情况下获得真实数据,就构成了一定的困难。本文介绍了对最常用的软件开发复杂性评估方法(特别是 IFPUG、UCP、COCOMOII 等)的分析和比较结果,包括优势和局限性的识别。提出了决策支持系统操作的通用算法,以减少 IT 公司分析师在编制技术规范时进行估算的时间并提高计算的有效性。介绍了决策支持系统设计模块的各个屏幕形式。
{"title":"DEVELOPMENT OF A DSS MODULE WHEN PREPARING ASSESSMENTS FOR IT COMPANY CLIENTS","authors":"","doi":"10.18469/ikt.2023.21.1.12","DOIUrl":"https://doi.org/10.18469/ikt.2023.21.1.12","url":null,"abstract":"The article considers the relevance of the search for toolkit for objective software development complexity and timing assessment. The key purpose of this toolkit is to provide an IT company with the opportunity to objectively assess the labor intensity, the cost of a future software product at an early stage, on the one hand, and to ensure transparency in justifying an acceptable transaction price for the customer, on the other hand. A special feature of the IT industry is the intangible nature of the created product and, as a result, the challenge of choosing methods (metrics) for labor intensity assessment and predicting the timing of the software product implementation, which allows obtaining realistic data without serious time and financial costs, poses a certain difficulty. The results of the analysis and comparison of the most common methods of software development complexity assessment (in particular, IFPUG, UCP, COCOMOII, etc.), including identification of advantages and limitations, are presented. A generalized algorithm for the decision support system operation is proposed to reduce time and increase the validity of calculations when drawing up estimates by an IT company analyst as a part of the preparation of technical specifications. A description of individual screen forms of the decision support system designed module is provided.","PeriodicalId":245247,"journal":{"name":"Infokommunikacionnye tehnologii","volume":"380 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139022958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}