Radio engineering, including television systems and devices
METHOD FOR DETERMINING THE PARAMETERS OF INTERFERENCE AFFECTING THE INPUT OF THE REPEATER TRUNK
|
A. Brydchenko, V. Gridnev, D. Gruzdev, M. Miroshnik
|
Read
Abstract: Military satellite communication networks operate under the influence of enemy radio suppression systems. To suppress the network, it is necessary to put a deliberate interference either at the entrance of the trunk of the communication repeater, or at the entrance of satellite communication stations operating in this network. Taking into account the peculiarities of building a satellite communication network, the most likely effect is the radio-electronic suppression complex at the entrance of the repeater trunk. The article presents a method for determining the parameters of interference affecting the input of the repeater trunk.
Keywords: Earth station for satellite communications, radio intelligence, electronic suppression.
DOI 10.31854/2307-1303-2019-7-4-1-8
|
MODELING PLL LOOP WITH NONLINEARITY |
Y. Nikitin, G. Tsygankov |
Read
Abstract: A model of a pulse phase-locked loop multiplying ring in a MicroCap11 medium is considered. The analysis uses a nonlinear model of a voltage-controlled oscillator with a user-defined control characteristic. An RS-trigger is used as a pulse-phase detector, a pulse counter in the negative feedback circuit is implemented on JK-triggers. Transient processes in the ring, as well as the spectrum of the output oscillations in the steady (stationary) mode are considered.
Keywords: PLL loop, oscillations spectrum, voltage-controlled oscillator, pulse-phase detector, phase-locked loop.
DOI 10.31854/2307-1303-2019-7-4-9-14
|
DVB-I: TELEVISION WITHOUT BORDERS |
V. Luzhkovskaya, S. Fedorov |
Read
Abstract: DVB-I is the new digital television standard developed for linear television services distributed over broadband internet. The proposed standard is designed to provide a user-friendly system for transmitting video content on the Internet, not inferior in quality to television broadcasts. The specification of the DVB-I standard contains a list of TV services equipped for compatibility with Internet devices, methods for transmitting electronic data; as well as functions that allow devices connected to the Internet to find the necessary collections of linear services that can be received via the Internet or broadcast. The proposed system is quite simple and has a convenient single interface. Using the new standard, and having stable access to the Internet, the user can watch TV online on any device that has a media player.
Keywords: DVB-I, standard, digital television, video content, Internet.
DOI 10.31854/2307-1303-2019-7-4-15-20
|
Telecommunication systems, networks and devices
AN INTRODUCTION TO 5G NETWORK SLICING TECHNOLOGY |
B. Goldstein, V. Elagin, K. Kobzev, A. Grebenshchikova |
Read
Abstract: Communications Service Providers are looking to 5G technology as an enabler for new revenues, with network slicing providing a cost-effective means of supporting multiple services on shared infrastructure. Different radio access technologies, network architectures, and core functions can be brought together under software control to deliver appropriate Quality of Service "slices," enabling new levels of service innovation, such as high bandwidth for video applications, low latency for automation, and mass connectivity for Smart Cities.
Keywords: Network Slicing, 5G.
DOI 10.31854/2307-1303-2019-7-4-21-29
|
SIMULATION OF A 5G CLOUD SYSTEM WITH A LOAD BALANCER |
S. Polevich, O. Simonina |
Read
Abstract: The work is aimed at organizing virtualization and developing load balancing in a 5G network. Based on existing software and hardware solutions, a virtual network is built that reflects the general concept of organizing a cloud RAN. The basic functionality of load balancing is described in the form of redirecting requests depending on the type of requested traffic and advanced – restrictions on access to the channel / resource for several types of subscribers. It is shown that such a system can be implemented on the basis of Linux OS, Nginx server with upstream module. To illustrate the experiment, a Docker container is used that supports the structure of layers, on each of which a PHP handler is launched that determines the operation of the balancer.
Keywords: 5G, virtualization, cloud, load balancing, traffic filtering.
DOI 10.31854/2307-1303-2019-7-4-30-36
|
ON THE USE OF WI-FI IN MARKETING |
R. Dunaytsev, A. Shabanova |
Read
Abstract: During the last decade, we have witnessed an ever-growing increase in the use of Wi-Fi in geomarketing and advertising in the form of Wi-Fi analytics and hyperlocal targeting. Using a special device installed in a store, cafe, etc., the MAC addresses of mobile users who walked by or entered inside are collected. Further, the collected MAC addresses are used either to measure traffic intensity or to display targeted commercials of these establishments, as well as their goods and services. This paper discusses business opportunities of Wi-Fi in marketing.
Keywords: Wi-Fi, geomarketing, MAC address, Wi-Fi analytics, hyperlocal targeting.
DOI 10.31854/2307-1303-2019-7-4-37-42
|
System analysis, information management and processing, statistics
MODEL ANALYTICAL INTELLIGENCE OF AGENTS FOR DETECTING SUDDEN EVENTS |
D. Paskin, L. Ptitsyna |
Read
Abstract: The objective reasons for the demand in the digital economy of intelligent systems for detecting suddenly occurring events are described. The principles of the formation of software for agents for detecting sudden events are presented. Typical conditions for the functioning of agents are considered. A method for detecting sudden events has been selected. Detection quality indicators are determined. Revealed techniques for modeling detection processes. Formed model analytical intelligence agents detecting suddenly occurring events.
Keywords: An occurring event, detection, software agent, method, detection quality, indicators, model analytical intelligence.
DOI 10.31854/2307-1303-2019-7-4-43-49
|
RESEARCH METHODOLOGY OF THE METHOD OF OPTIMIZATION OF INFORMATION INTERACTION IN THE ASPECT OF SOLVING THE USER'S PROBLEM |
M. Buinevich, P. Kurta |
Read
Abstract: Research subject. Information interaction of the user with the information system. Objective. Improving the efficiency of user interaction with the information system to solve the main problem by customizing its interface and work script. Core results. The proposed methodology of scientific research aimed at achieving the goal, and consisting of 3 steps. As a result of each of them, the following main scientific results are expected to be obtained: interaction model, interaction assessment method, interaction optimization method. Also, it is expected to obtain private scientific results: the classification of the disadvantages of interaction, the influence of its parameters on the final efficiency, the architecture of the interface and scenario optimization system. Main conclusions. The proposed research scheme is scientifically correct and allows you to conduct a full-fledged scientific research and achieve the goal of the work. As a result, a method and a software tool will be developed that will make it possible to adjust a specific interface and a scenario for its work according to its own performance criteria - potency, operativeness and resource efficiency; at the same time, the general logic of solving the problem by the information system will remain unchanged.
Keywords: research methodology, information interaction, information system, interface, work scenario, model, assessment method, optimization method, genetic algorithm, efficiency
DOI 10.31854/2307-1303-2019-7-4-50-58
|
Methods and systems of information protection, information security
APPLICATION OF MACHINE TRAINING TO SEARCH VULNERABILITIES IN THE SOFTWARE CODE |
M. Buinevich, P. Zhukovskaya, K. Izrailov, V. Pokussov |
Read
Abstract: The article considers the possibility of using artificial intelligence in the field of information security. For this, the following domain contradiction was highlighted: sharpening of detection algorithms for specific vulnerabilities in VS code, constant modification of the vulnerability code. To resolve the contradiction, an object is considered – software with vulnerabilities in the process of its development, for the subject – ways of intellectual analysis of its characteristics. A hypothetical solution is proposed through the use of Machine Learning Technology to identify vulnerabilities in software, using a huge amount of accumulated knowledge. Also, possible signs of software representations used for the operation of the Technology are given.
Keywords: Machine learning, vulnerabilities, errors, defects, software, machine code, source code.
DOI 10.31854/2307-1303-2019-7-4-59-65
|
© SPbSUT © Authors
|
|