Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search
No 4 (2019)
View or download the full issue PDF (Russian)
3-9 9322
Abstract

In this article, organization of additional service system in office data transmission networks making a decision on quality of the transferred video flow by means of a mathematical apparatus of fuzzy logic is presented. The necessity of flexible server control of VCS in the presence of service data network channels with limited bandwidth is shown. The parameters demanded for making decision on the necessity for changing the selected bandwidth for audio-and video flows are entered. To draw up accessory functions a method of paired comparisons is offered.

10-15 3632
Abstract

Game simulation of agents’ rational behavior in the market of oligopoly with their incomplete awareness involves multiple repetition of the game and the construction of decisions made trajectory. The problem of constructing the trajectory that guarantees the equilibrium and efficiency from the point of view of assumptions concerning the current awareness of agents in conditions of their limited cognitive capabilities, the capabilities of the agents in determining the value of steps, the rate of convergence is important. A model of dynamic behavior in the Cournot market in the class of linear demand functions and costs of agents is presented. Using minimal information about the market and observing only the current market price, agents in the dynamics d based on the model of collective behavior clarify their output volumes. Sufficient conditions for convergence of dynamics to the Cournot–Nash equilibrium with the steps of agents varying from game to game, but equal in each individual game are obtained. Features and possible solutions for improving the dynamics are discussed. A comparative analysis of the conditions on steps value for a number of trajectories convergence is also carried out.

16-22 4336
Abstract

The efficiency of using soft assessment for transmission over a distributed wireless sensor network is considered. According to the simulation results, it was determined that the proposed transmission method has a tangible gain in terms of the probability of bit error, in contrast to the traditional use of hard assessment for transmission over a wireless channel with Rayleigh fading.

23-32 3069
Abstract

The article states ways to scale digital filters (DF) with lateral feedbacks (LFB). Models of four types recursive of DF with LFBs with their nonrecursive implementation are considered. Filters are scaled using hi impulse response and scaling using the amplitude-frequency characteristic of the circuit. The obtained results allow, on the one hand, to prevent overfilling of the grade graticule of the DF with LFBs, and on the other hand, to significantly increase its noise immunity and efficiency.

33-41 3394
Abstract

Digital watermarks are used for detection unauthorized edition of executable files by malicious programs. A property called “fragile” provides its distortion after minor changes in a program. The watermark presence and correctness controlled by endpoint user, which is obviously interested in software integrity. Semi-fragile DWM distorts when changing the program more than the set threshold. According to proposed method a program is considered as a container with digital signal that can be recovered from its samples (program commands). Any changes in the program code inevitably change the signal spectrum. During the analysis of modified program it was founded some distortion of the original signal: changing phases and amplitudes of some harmonics. The proposed approach allows to reveal not only the fact of modification, but also an amount of added code.

42-55 3944
Abstract

We propose new original mathematical approach to the problem of a risk management concerning ensuring quality of educational activity of higher education institution. As a basic method of risk management the risk thermometer identifying a risk background of educational process is used. Estimation of risks is carried out by means of fuzzy composition of the obtained temperature data with the fuzzy relation of compliance of risks to their key indicators. The method of fuzzy clustering is applied to construction of risk temperature’s function with optimum parameters. As examination results the optimum of complex of actions for developing educational organization formed.

56-61 3061
Abstract

This article considers a lower estimation of the universal coding redundancy of an arbitrary set of sources without memory coinciding in decreasing order with the upper estimation obtained by the author in the previous work.

62-71 3398
Abstract

The article considers the analysis of Russian experience in implementing quality management systems. The authors provide a historical retrospective, identify the common features, advantages and disadvantages of the implemented approaches, indicate the connection with the most common world practices. In conclusion, the authors give recommendations to prevent the most common mistakes in the implementation of quality management systems. The article has a methodological and practical interest for companies implementing quality management systems.

72-77 3166
Abstract

An algorithm for optimizing the composition of tasks is considered, taking into account their informational relationships and resource limitations. A computational experiment was developed and conducted. The obtained results do not refute the hypothesis that the solutions got on the basis of the original algorithm are not only admissible, but also suboptimal.

78-87 6124
Abstract

The article describes the features of the generation and processing of IoT traffic with parallel spatial switching systems. The concept of the Internet of Things (IoT) technology involves routing functions with traffic processing functions combination. This combination is well traced on "Network on Chip" (NoC) technology. The core of most NoC systems are parallel spatial switching systems with 5×5 switching matrices. A simplified model of the NoC switch was implemented by us as a queuing system. To implement the model, the Python programming language was used. In this research, the features of IoT traffic processing with parallel spatial switching system having infinitely large input and output buffers were studied. As a result of the work, the values of the maximum and average queues in output buffer devices of the system were obtained.

88-92 4289
Abstract

The parameter characterizing the applicability of flexible graphene antennas is defined. Relationship of graphene antenna material resistance to direct current is determined. The analysis was carried out on the basis of the experiment, computer modeling and monitoring of literature data.

83-104 3620
Abstract

The using of preambles for frame synchronization are considered. It is shown that the preamble encoded by a convolutional encoder, in some cases, can reduce the probability of false synchronization compared to a preamble without error correction coding. A technique for detecting of channel inversion and incorrect symbol identification of a pair of elements in the input stream of encoded data that does not require trial decoding is provided.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)