Сообщение

2023, Vol. 11, Iss. 3

22 10 4

Telecommunication systems, networks and devices

Algorithm for Evaluating the Effectiveness of Compositional Equilibrium of Graphical User Interfaces
A. Vostrykh

 Read

Abstract: Formulation of the problem: with the rapid development of information technology, numerous analogues of multidisciplinary programs are increasingly appearing on the software market. Despite the similarity of functions and identical sets of tools, these programs have different graphical user interfaces - program shells that provide the user with the opportunity to interact with the program using logic. In most cases, the overall assessment of users regarding the quality of programs depends on the effectiveness of interfaces. Having a scientific and methodological tool for assessing the effectiveness of interfaces, we can analyze them for the presence of various defects. Currently, there is no comprehensive tool for assessing the effectiveness of interfaces in the scientific literature. The purpose of the work is to develop evaluation tools that allow assessing the effectiveness of software product interfaces in numerical form. Methods: to achieve the stated goal, a comparative analysis of existing quantitative methods, metrics and laws from the scientific literature and international standards for software design and their software interfaces was carried out. Novelty: in comparison with existing methods, the developed approach is presented in the form of an algorithm capable of calculating indicators in the direction of the effectiveness of the compositional equilibrium of graphical user interfaces, which has not previously been evaluated by other researchers. Result: an algorithm has been developed for assessing the effectiveness of the compositional balance of graphical user interfaces, which allows for the evaluation and comparison of software products in this area.
Keywords: graphical user interface, algorithm, compositional balance, efficiency, contrast, balance.
DOI  10.31854/2307-1303-2023-11-3-1-12
Analysis of Possible Interference Effects Minimization in IEEE 802.11ax Network by Partial Allocation of Resource Units
A. Vikulov, D. Tesalovskaya

 Read

Abstract: Statement of the problem: one of the main tasks in IEEE 802.11 networks planning is adjacent channel interference mitigation. The purpose of the work is to synthesize a model and analyze the possibility of adjacent channel effects minimization by partial allocation of OFDMA resource units allocation. Methods used: mathematical analysis methods and spectrum modeling. Novelty: in contrast to the existing approaches, quantative estimations of data rate gain has been calculated and a corresponding step-by-step method has been proposed. Result: in this paper an analysis of partial allocation of resourve units within IEEE 802.11ax channel has been carried out. A model of the adjacent channel interference has been proposed, where signal to noise ratio is estimated via spectrum calculation of target and interferer signals. The model parameters range is estimated which corresponds to the gain of total multi user data rate gain in comparison to full target channel resource units utilization. Theoretical and practical relevance: method may be used to additional increase of total data rate in multi user channel operation mode in case of IEEE 802.11 networks interference presence.
Keywords: wireless access network, IEEE 802.11ax, adjacent-channel interference, signal to noise ratio, modulation and coding scheme, resource units.
DOI  10.31854/2307-1303-2023-11-3-13-26
Combining of Heterogeneous Destructive Impact on the Information System and Countering Attacks (on Example by Insider Activity and DDoS-Attack)
M. Buinevich, G. Moiseenko

 Read

Abstract: Problem statement. By now, information security specialists have developed a sufficiently broad pool of mechanisms and means of countering cyberattacks for virtually all classes of destructive effects on information systems. Therefore, in order to break the relative parity "attack vs defense", attackers intensify their onslaught on information security systems by combining heterogeneous destructive influences, thus hampering the ability to counteract them. Despite a significant number of publications devoted to such information confrontation, there are no scientific studies devoted to analyzing this relatively new phenomenon in terms of identifying the limits of combinations, as well as the ability to counteract possible combinations in the public domain. The aim of the work is to study the phenomenon of combining heterogeneous destructive influences on the information system and counteracting such attacks. Methods used. The possibility of combining qualitatively heterogeneous attacks on the information system of the organization is studied. In order to classify and distinguish such attacks, categorical division apparatus is applied using the following pairs: Human vs Automaton, Inside vs Outside, Single vs Multiple. Result. The application of categorical division allowed to distinguish 8 classes of attacks from the position of their realization mechanism; the interpretation of each of the classes is given and an example is given. Novelty. The combination of two seemingly unrelated destructive influences – insider activity and DDoS-attack – is considered for the first time; their generalized scheme, stages of their implementation, as well as the complexity of counteraction to them are given.
Keywords: information security, combination of attacks, categorical division, insider activity, DDoS attack.
DOI  10.31854/2307-1303-2023-11-3-27-36
Holographic Type of Communication: Definition, Analysis of the Main Features, Forms of Implementation
N. Demidov

 Read

Abstract: Problem statement: the development of holographic technologies has led to interest in the problem of transmitting holographic information to ensure the effect of the interlocutor’s presence during communication using high-tech equipment. The study of the holographic type of communication, parameters and characteristics of holographic traffic is becoming significant and relevant. Result: based on the analysis of scientific publications devoted to the study of holographic type communication, its main features are determined, and a study of holographic traffic is conducted. Novelty: the results of research on the study of innovative approaches to the development of holographic type of communications are summarized, new data for the study of holographic conferencing are obtained. Practical significance: the results of the study can become the basis for the formation of new competencies among students of higher educational institutions in preparation for professional activity in the field of communication services.
Keywords: holographic type of communication, holographic technologies, innovative infocommunication technologies, telepresence technology, holographic telepresence, holographic avatar, holographic conferencing.
DOI  10.31854/2307-1303-2023-11-3-37-48
Semantic Positioning of Clusters Information Packages
L. Makarov, A. Pozdnyakov

 Read

Abstract: Problem statement. Considerable attention paid to various aspects of the use of artificial intelligence technologies in the tasks of semantic description of a variety of objects and phenomena requires consideration of the issues of coupling the processes of neural activity of brain structures and formal computer modeling procedures. The purpose of the work: to consider the possibility of creating a computer semantic model for positioning information flows in the format of clusters, initialized both in the process of thinking and using examples of natural physical objects and phenomena. The methods used. Taking as a basis the theoretical postulates of computational topology, a mathematical model of cluster formation is presented, taking into account the numerical semantic indicators of the elements. Result. It is shown that it is possible to operate clusters with different physical and morphological characteristics in order to reproduce the emergence indicator in terms of the model. Novelty. By means of a mathematical model, the possibility of semantic positioning of information packages of various physical nature has been established.
Keywords: emergence, computational topology, computer modeling.
DOI  10.31854/2307-1303-2023-11-3-49-61

© SPbSUT © Authors

 
войти

Авторизация