Vestnik SibGUTI


Papers of Journal no. 2019.4

O. Kovalenko, K. Fadeev, D. Kovalenko "Adaptive control via video conference server while organizing additional service in corporate networks"  // More...

In this article, organization of additional service system in office data transmission net-works making a decision on quality of the transferred video flow by means of a mathe-matical apparatus of fuzzy logic is presented. The necessity of flexible server control of VCS in the presence of service data network channels with limited bandwidth is shown. The parameters demanded for making decision on the necessity for changing the selected bandwidth for audio-and video flows are entered. To draw up accessory functions a method of paired comparisons is offered.


D. Algazina, J. Algazina "Dynamics and equilibrium in the Cournot model with incomplete information"  // More...

Game simulation of agents’ rational behavior in the market of oligopoly with their incomplete awareness involves multiple repetition of the game and the construction of decisions made trajectory. The problem of constructing the trajectory that guarantees the equilibrium and efficiency from the point of view of assumptions concerning the current awareness of agents in conditions of their limited cognitive capabilities, the capabilities of the agents in determining the value of steps, the rate of convergence is important. A model of dynamic behavior in the Cournot market in the class of linear demand functions and costs of agents is presented. Using minimal information about the market and observing only the current market price, agents in the dynamics d based on the model of collective behavior clarify their output volumes. Sufficient conditions for convergence of dynamics to the Cournot–Nash equilibrium with the steps of agents varying from game to game, but equal in each individual game are obtained. Features and possible solutions for improving the dynamics are discussed. A comparative analysis of the conditions on steps value for a number of trajectories convergence is also carried out.


D. Bychenkov "Comparison of the distributed wireless communication systems characteristics with soft and hard decisions"  // More...

The efficiency of using soft assessment for transmission over a distributed wireless sensor network is considered. According to the simulation results, it was determined that the proposed transmission method has a tangible gain in terms of the probability of bit error, in contrast to the traditional use of hard assessment for transmission over a wireless channel with Rayleigh fading.


V. P. Bakalov "Scaling recursive of digital filters with nonrecursive lateral feedbacks"  // More...

The article states ways to scale digital filters (DF) with lateral feedbacks (LFB). Models of four types recursive of DF with LFBs with their nonrecursive implementation are considered. Filters are scaled using hi impulse response and scaling using the amplitude-frequency characteristic of the circuit. The obtained results allow, on the one hand, to prevent overfilling of the grade graticule of the DF with LFBs, and on the other hand, to significantly increase its noise immunity and efficiency.


I. V. Nechta "Semi-fragile digital watermarks based on Fourier spectrum"  // More...

Digital watermarks are used for detection unauthorized edition of executable files by malicious programs. A property called “fragile” provides its distortion after minor changes in a program. The watermark presence and correctness controlled by endpoint user, which is obviously interested in software integrity. Semi-fragile DWM distorts when changing the program more than the set threshold. According to proposed method a program is considered as a container with digital signal that can be recovered from its samples (program commands). Any changes in the program code inevitably change the signal spectrum. During the analysis of modified program it was founded some distortion of the original signal: changing phases and amplitudes of some harmonics. The proposed approach allows to reveal not only the fact of modification, but also an amount of added code.


Y. Shevtsova, V. Kanev, A. Poletaikin, N. Kuleshova "New mathematical model of risk management of education organization"  // More...

We propose new original mathematical approach to the problem of a risk management concerning ensuring quality of educational activity of higher education institution. As a basic method of risk management the risk thermometer identifying a risk background of educational process is used. Estimation of risks is carried out by means of fuzzy composition of the obtained temperature data with the fuzzy relation of compliance of risks to their key indicators. The method of fuzzy clustering is applied to construction of risk temperature’s function with optimum parameters. As examination results the optimum of complex of actions for developing educational organization formed.


V. K. Trofimov "Evaluation of the universal coding redundancy of an arbitrary set of sources without memory"  // More...

This article considers a lower estimation of the universal coding redundancy of an arbitrary set of sources without memory coinciding in decreasing order with the upper estimation obtained by the author in the previous work.


A. A. Bychkov, A. I. Karpovich "Russian experience in implementing quality management systems"  // More...

The article considers the analysis of Russian experience in implementing quality management systems. The authors provide a historical retrospective, identify the common features, advantages and disadvantages of the implemented approaches, indicate the connection with the most common world practices. In conclusion, the authors give recommendations to prevent the most common mistakes in the implementation of quality management systems. The article has a methodological and practical interest for companies implementing quality management systems.


K. Razdobreev, M. Razdobreev "Quality assessment of the optimization algorithm of automated control tasks composition "  // More...

An algorithm for optimizing the composition of tasks is considered, taking into account their informational relationships and resource limitations. A computational experiment was developed and conducted. The obtained results do not refute the hypothesis that the solutions got on the basis of the original algorithm are not only admissible, but also suboptimal.



D. Kutuzov, A. Osovskiy, O. Stukach "IoT traffic generation and processing model with parallel switching systems "  // More...

The article describes the features of the generation and processing of IoT traffic with parallel spatial switching systems. The concept of the Internet of Things (IoT) technology involves routing functions with traffic processing functions combination. This combination is well traced on "Network on Chip" (NoC) technology. The core of most NoC systems are parallel spatial switching systems with 5×5 switching matrices. A simplified model of the NoC switch was implemented by us as a queuing system. To implement the model, the Python programming language was used. In this research, the features of IoT traffic processing with parallel spatial switching system having infinitely large input and output buffers were studied. As a result of the work, the values of the maximum and average queues in output buffer devices of the system were obtained.

Keywords: IoT, parallel routing, parallel devices, QoS, NoC.


A. Cherevko, Yu. Morgachev, E. Il’in, A. Polubekhin, V. Flegontov "The critical bending radius of graphene antennas estimation "  // More...

The parameter characterizing the applicability of flexible graphene antennas is defined. Relationship of graphene antenna material resistance to direct current is determined. The analysis was carried out on the basis of the experiment, computer modeling and monitoring of literature data.


O. Melent'ev, I. Maximov, I. Shevnina "Using convolutional encoded preambles for frame synchronizations"  // More...

The using of preambles for frame synchronization are considered. It is shown that the preamble encoded by a convolutional encoder, in some cases, can reduce the probability of false synchronization compared to a preamble without error correction coding. A technique for detecting of channel inversion and incorrect symbol identification of a pair of elements in the input stream of encoded data that does not require trial decoding is provided.