Vol 9, No 1 (2023)

Articles

Justification of the Empirical Expression for Assessing the Noise Immunity of Quadrature Modulation Signals

Dvornikov S.S.

Abstract

An approach to the substantiation of the empirical formula for calculating the bit error probability of quadrature modulation signals in terms of the average signal energy and the minimum Euclidean distance is considered. An analytical description of quadrature synthesis signals in the time and frequency continuum is presented. An approach to assessing the noise immunity of quadrature modulation signals from the standpoint of the indicator of the average signal energy and the Euclidean distance is considered. The equivalence of various well-known approaches to the analytical calculation of the bit error probability is shown. Graphic materials are presented, as well as simulation results. Empirically substantiated is a universal expression for assessing the noise immunity of receiving quadrature modulation signals, based on the differences in the average energy value and the value of the minimum Euclidean distance. Its generality with known expressions is shown.
Proceedings of Telecommunication Universities. 2023;9(1):6-13
pages 6-13 views

Numerical Analysis of the Mathematical Model of a Cluster V2X-System

Plotnikov P.V., Vladyko A.G.

Abstract

The article analyzes the results of numerical modeling of information processes in vehicular ad-hoc networks (VANETs). The review of works devoted to clustering and data caching schemes in Vehicle-to-Everything (V2X) systems is given. L1-metric was chosen as a metric because of its active use in cities with modern layout. Two approaches to the description and evaluation of the efficiency of interaction of boundary devices in a traditional configuration and using a cluster scheme with a shared cache are considered. A mathematical model is constructed and an analysis of its effectiveness is carried out. It is shown that the introduction of new IEEE 802.11bd standards will increase the percentage of serviced devices, thereby minimize the overall delay of computing, which will improve the efficiency of the V2X-system. The results of the study can be used in the design and deployment of automated traffic control systems in cities.
Proceedings of Telecommunication Universities. 2023;9(1):14-23
pages 14-23 views

Mathematical Model of the Unbalanced Monopole Feed. Part 1. General Approach to Building a Mathematical Model

Popov O.V., Tumashov A.V., Borisov G.N., Korovin K.O.

Abstract

The paper proposes a method for separate calculation of the reactive component of the input impedance, radiation resistance and loss resistance small, in comparison with the wavelength of normally open antennas. A detailed equivalent circuit of of the Unbalanced Monopole with Shunt Feed (UMSF). Integral relations are obtained that determine the radiation resistance and the electromotive force of an equivalent generator. The decomposition of the active part of the input resistance into two components, one of which characterizes the radiated power, and the other - thermal losses, allows us to successfully solve both the problem of determining the resistance matching coefficient and the antenna efficiency. The results obtained can be useful in the design of antennas and energy calculations of radio links.
Proceedings of Telecommunication Universities. 2023;9(1):24-33
pages 24-33 views

Direct Sequence Spread Spectrum Signal’s Demodulator Acquisition Implementation Based on Fast Fourier Transform. Part 2. Carrier Frequency Estimation

Brusin E.A.

Abstract

Signals with direct spread spectrum are widespread in modern communication and navigation systems. Often for communication channels in which such signals are used, significant changes in the carrier frequency in relation to the information speeds of the received signals are characteristic. In particular, for communication channels with significant Doppler shift. Therefore, estimation of the carrier frequency plays a key role in solving the problem of initial synchronization of demodulators of signals with direct spectral broadening. In the first part of the paper, the main approaches to solving the initial synchronization problem were presented. In this part of the paper an algorithm for estimating the carrier frequency based on the analysis of the received signal uncertainty function cross section in the delay plane was proposed. The carrier frequency estimation is based on the fast Fourier transform using an iterative dichotomous search procedure. The results of its efficiency analysis are presented; the variance of the estimates obtained in the implementation of the proposed estimation algorithm are compared with the Cramer-Rao boundary.
Proceedings of Telecommunication Universities. 2023;9(1):35-40
pages 35-40 views

Effective Channel Planning of IEEE 802.11 Networks as a Plane Tessellation Problem. Part 3. Solutions of Best Channel Configuration Selection Problem for Eight-Channel Case

Vikulov A.S.

Abstract

When solving the problem of channel planning of IEEE 802.11 wireless access networks, it is necessary to allocate channels for access points so that the selected channel configuration provides minimum negative mutual influence. We will consider the covering of the plane “tessellation”, i.e. the densest filling, by coverage areas of access points groups, which in the spectral sense correspond to channel clusters. By assigning a channel to each of the access points, we obtain a set of possible configurations, each of which corresponds to a possible solution of the channel planning problem. When solving actual design problems in the 5 GHz band, it is often necessary to take into account channel plans that include 8 or more channels. Based on the previously proposed model and method, in this paper, solutions to the problem of finding the best channel configuration for clusters consisting of 8 access points are obtained, and their characteristics are shown in relation to their geometry.
Proceedings of Telecommunication Universities. 2023;9(1):41-51
pages 41-51 views

The Sensitivity Investigation of Fiber Optic Paths in the Framework of an Intruder Localization at a Protected Facility

Kartak V.M., Gubareva O.Y., Dashkov M.V., Gureev V.O., Evtushenko A.S.

Abstract

The paper considers the possibility of using communication lines already existing at urban development sites based on such information transfer technologies as «fiber-to-the-office» and «fiber-to-the-desk» in relation to the tasks of physical protection of objects. The aspects of using distributed acoustic sensors based on a phase-sensitive optical time-domain reflectometer for localizing sources of acoustic impact in real-time, that is, for determining the location of an intruder on a protected object, are considered. The sensitivity of optical paths to acoustic influences corresponding to the speech signals of the alleged intruder was assessed. An optical path based on optical fiber in an optical module with a hydrophobic filling is considered. An analysis of the spectral sensitivity of the optical fiber samples under study has been carried out. An assessment of the influence of the conditions for the passage of the route of laying the optical cable and the interaction of the acoustic sensor with the surrounding objects was carried out. The analysis of the results obtained during the test events at the experimental site was carried out.
Proceedings of Telecommunication Universities. 2023;9(1):52-58
pages 52-58 views

Analysis of Experience Quality Parameters of Cloud Video Conferencing Systems under Interference Conditions

Kirichek R.V., Berezkin A.A., Kukunin D.S., Kolesnikov A.V.

Abstract

The article deals with the testing of popular domestic and foreign cloud videoconferencing systems. A methodology for testing and comparing qualitative parameters of videoconferencing applications based on international experience is proposed. Assessment and comparison of videoconferencing services is based on the calculation of Hurst data flows, formed by the investigated cloud videoconferencing systems. Various applications of foreign and domestic videoconferencing systems have been tested in different operation modes with different channel quality parameters.
Proceedings of Telecommunication Universities. 2023;9(1):59-73
pages 59-73 views

Modeling a Program with Vulnerabilities in the Terms of Its Representations Evolution. Part 1. Life Cycle Scheme

Izrailov K.E.

Abstract

The investigation results of the creating programs process and the resulting vulnerabilities are presented. The first part of the articles series offers a life cycle graphical scheme of the representations (namely, the following: Idea, Conceptual model, Architecture, 2D block diagram, Function diagram, Flowchart, Structogram, Pseudo-code, Classical code, Generation metacode, Script code, Assembly code, Abstract Syntax Tree, Machine Code, Bytecode) through which any sample program passes. The main properties of such representations are indicated - the purpose, form and content, obtaining and restoring representations methods, as well as possible vulnerabilities and ways to detect them. A vulnerabilities nested classification is introduced, consisting of their division according to the structural level in the program, the change in the content of the functionality and the impact on the information being processed.
Proceedings of Telecommunication Universities. 2023;9(1):75-93
pages 75-93 views

Properties of Malicious Social Bots

Kolomeets M.V., Chechulin A.A.

Abstract

The paper considers the ability to describe malicious bots using their characteristics, which can be the basis for building models for recognising bot parameters and qualitatively analysing attack characteristics in social networks. The following metrics are proposed using the characteristics of VKontakte social network bots as an example: trust, survivability, price, seller type, speed, and expert quality. To extract these metrics, an approach is proposed that is based on the methods of test purchases and the Turing test. The main advantage of this approach is that it proposes to extract features from the data obtained experimentally, thereby obtaining a more reasonable estimation than the expert approach. Also, an experiment on extracting metrics from malicious bots of the VKontakte social network using the proposed approach is described, and an analysis of the metrics' dependence is carried out. The experiment demonstrates the possibility of metrics extracting and analysis. In general, the proposed metrics and the approach to their extraction can become the basis for the transition from binary attack detection in social networks to a qualitative description of the attacker and his capabilities, as well as an analysis of the evolution of bots.
Proceedings of Telecommunication Universities. 2023;9(1):94-104
pages 94-104 views

Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks

Levshun D.S.

Abstract

The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includes models of hardware, software and hardware-software elements, interfaces, protocols and links between system elements, models of attacker and attack actions. The key difference of the developed model lies in the possibility of full representation of microcontroller-based systems, while other solutions have a drawback of designing such systems without taking into account the interactions of their devices with each other and other systems. In addition, the developed model is modular and extensible, aims to ensure the security of the designed solution from cyber-physical attacks, and considers security elements as an integral part of the final solution.
Proceedings of Telecommunication Universities. 2023;9(1):105-115
pages 105-115 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies