Vol 9, No 6 (2023)

COMPUTER SCIENCE AND INFORMATICS

Mathematical Model of the Unbalanced Monopole Feed. Part 3. Gain

Popov O.V., Tumashov A.V., Borisov G.N., Korovin K.O.

Abstract

An integro-differential operator is specified that determines the longitudinal component of the electric field strength on the surface of the emitter conductor of an Unbalanced Monopole with Shunt Feed, created by the Base Current (BC). Analytical expressions are obtained that determine the parameters of an equivalent eight pole, which is the internal resistance of equivalent BC generators. The influence of the length of the counterweight conductors and the upper load of the high-voltage transformer on the efficiency and gain was studied.
Proceedings of Telecommunication Universities. 2023;9(6):6-23
pages 6-23 views

ELECTRONICS, PHOTONICS, INSTRUMENTATION AND COMMUNICATIONS

Direct Sequence Spread Spectrum Signal’s Parameters Estimation Bounds

Brusin E.A.

Abstract

The article discusses the problems of direct spread spectrum signal’s parameters estimation and estimation performance analyzing. The achieved estimation variances compared with the corresponding Cramer ‒ Rao bounds as a rule. The proposed approach makes it possible to determine the bounds for signals of various types of modulation and spectral characteristics. The dependences of the Cramer ‒ Rao bounds on the signal-to-noise ratio, the spread spectrum sequence length and the duration of the observation interval are presented.
Proceedings of Telecommunication Universities. 2023;9(6):25-33
pages 25-33 views

Electromagnetic Accessibility of Starlink User Terminals

Dvornikov S.V.

Abstract

The results of assessing the electromagnetic accessibility of radio emission sources of the Starlink satellite communication system are presented. The features of the organizational and technical structure of the system are considered. Its main technical capabilities for organizing the provision of telecommunications services to users of subscriber terminals are analyzed. The technical features of the infrastructure of the Starlink satellite communication system, which are essential for the electromagnetic accessibility of its sources, have been studied. The possibility of radio links for transmitting information content in the upstream and downstream channels of the Starlink satellite communication system was assessed. The main stages of the developed methodology for assessing the electromagnetic accessibility of sources are presented. Analytical expressions are given for calculating the probability of detection and attenuation of signals. The requirements for the sensitivity of the receiving equipment of monitoring equipment are substantiated. Dependences of the level of signal attenuation on the distance of control equipment were obtained.
Proceedings of Telecommunication Universities. 2023;9(6):34-41
pages 34-41 views

Analyzing Traffic Identification Methods for Resource Management in SDN

Dmitrieva J.S., Okuneva D.V., Elagin V.S.

Abstract

The article is devoted to the analysis of traffic classification methods in SDN network. The review of analytical approaches of traffic identification to identify the solutions used in them, as well as assessing their applicability in the SDN network. Types of machine learning are considered and input parameters are analyzed. The methods of intelligent analysis covered in the scientific articles are systematized according to the following criteria: traffic identification parameters, neural network model, identification accuracy. Based on the analysis of the review results, the conclusion is made about the possibility of applying the considered solutions, as well as the need to form a scheme of SDN network with a module of artificial intelligence elements for load balancing.
Proceedings of Telecommunication Universities. 2023;9(6):42-57
pages 42-57 views

INFORMATION TECHNOLOGIES AND TELECOMMUNICATION

Proposals for Universal Protocol Fuzzer Construction

Vasinev D.A., Solovev M.V.

Abstract

The article studies the problem of ensuring information security in the field of telecommunications using the phasing method. The analysis of modern software products designed for testing by the fuzzing method is carried out, their disadvantages are revealed, and an approach to the creation of a universal mutation protocol fuzzer is proposed. The method of test data formation allows to automate the process of searching for vulnerabilities in telecommunication protocols and pro-software. Its novelty lies in the formation of test constructs on the basis of parameters of fields of telecommunication protocols. The proposed fuzzy solution allows to form an attack vector on the basis of known parameters presented in the threat database, as well as to modify these attack vectors.
Proceedings of Telecommunication Universities. 2023;9(6):59-67
pages 59-67 views

Methodology for Machine Code Reverse Engineering. Part 2. Static Investigation

Izrailov K.E.

Abstract

The creating results a unified methodology for reverse engineering the machine code of devices are presented. This second part of the articles series is devoted to static research of code in order to restore its metainformation (source code, algorithms, architecture, conceptual model), as well as search for vulnerabilities in it. A scientific publications review on the topic of existing methods and tools for static analysis of machine code is carried out. A detailed description and formalization of the steps of the stage is given, as well as examples of their application in practice. A proposed methodology partial diagram is presented in graphical form, indicating the main and intermediate results obtained.
Proceedings of Telecommunication Universities. 2023;9(6):68-82
pages 68-82 views

Machine Learning vs Software Vulnerability Detection: Applicability Analysis and Conceptual System Synthesis

Leonov N.V., Buinevich M.V.

Abstract

The article is devoted to the searching for vulnerabilities in software problem, as well as the possibilities of application of such a promising area in information technology as machine learning. For this purpose, a review of scientific publications in this area from Russian and foreign citation databases is made. A comparative analysis of the review's results was made according to the following criteria: publication year, application field, idea, solved problem of machine learning, degree of realization of its models and methods; for each criterion basic conclusions were drawn. As a result, 7 principles of building a new conceptual system of searching for vulnerabilities in software with the help of machine learning are proposed, the short meaning of which is as follows: program's multilateral study, combination of known methods, the use of machine learning in each method and algorithm of its management, the possibility of correcting the expert's work, storing information in a database and its synchronization with external, advisory nature of the found vulnerabilities; single software application usage. Based on the stated principles, a graphical scheme of such a system has been developed.
Proceedings of Telecommunication Universities. 2023;9(6):83-94
pages 83-94 views

Vulnerability Characteristics of Global Navigation Satellite System Consumer Equipment to Spoofing Attacks

Nerovny V.V., Korataev P.D., Oblov P.S., Tolstykh M.Y.

Abstract

The article presents approaches to assessing the vulnerability of navigation equipment of global navigation satellite systems consumers to spoofing attacks, as well as technologies for protection against interference and spoofing. Approaches and tools are proposed for assessing the vulnerability of navigation equipment of global navigation satellite systems in the presence of simulated interference. The results obtained can be used by developers to create a new generation global navigation satellite systems with improved protection against spoofing.
Proceedings of Telecommunication Universities. 2023;9(6):95-100
pages 95-100 views

RESEARCH RESULTS BY YOUNG SCIENTISTS

An Efficient Interface Model of User Interaction with a Query-Type Information Service

Kurta P.A.

Abstract

The work solves the problem an analytical model constructing of the user interaction interface with an information system designed to provide information based on multi-parameter user requests. The model purpose is to evaluate the effectiveness of the interface and, accordingly, the interaction itself. To do this, using an example of typical work with an interface, the following prerequisites (as conditions) for modeling are introduced: the effectiveness of the interface, its forms and transitions between them, interface elements, the atomic efficiency of the element and form, the order of their arrangement and the empirical dependence of efficiency, as well as the formulation interface design tasks. Using these premises, an appropriate efficiency model has been formed, which allows us too analytically, based on the structure and parameters of the interface, evaluate its effectiveness, operativeness and resource efficiency. A software prototype was created, which was based on the model and with the help of which a number of experiments were carried out under three scenarios, consisting of changing the number of forms and interface elements in order to determine their impact on overall efficiency; the corresponding dependencies were obtained in the form of histograms. Conclusions are drawn regarding the accuracy of the model, its theoretical and practical significance, as well as the overall complexity of designing “ideal” interfaces.
Proceedings of Telecommunication Universities. 2023;9(6):102-115
pages 102-115 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies