СОДЕРЖАНИЕ
The problem of passive geophysical monitoring of transport objects using acoustic and three-component seismic oscillations is considered. The solution is based on the application of spectral-time analysis, the method of spectral-polarization processing, the selection of informative frequencies of oscillations and the determining the direction finding on the object. The azimuthal orientation of the major axis position of the scattering ellipse obtained by polarization processing makes it possible to determine the direction finding. Numerical estimates of the accuracy of problem solving in a field experiment have been obtained. The proposed approach is based on consideration of the spatial-frequency characteristics of the object and its seasonal variation.
An original logical-probabilistic method for calculating the risk of critical patients’ medical evacuation by vehicles is proposed. A comprehensive estimation of road conditions and risk factors for transporting an intensive care patient as well as the calculation of a formal quantitative measure of transportation risk by the Bayesian inference method is considered. An effective instrument for estimating transportation risks for management decision making is developed.
Support for the development of projects at the level of inventions obtained by resolving technical contradictions in technical systems is limited to disconnected clusters of engineering space and has no unity. The high level of technical solutions found, capable of bringing the basic technical system closer to perfection, did not receive information support at the stage of transition from a conceptual solution to the use of CAD technologies, for some reason. As a result of the work carried out by the authors, the boundaries of the unformalized area between clusters are determined and a model of its filling is constructed, the task of which is to restore the data deficit responsible for the output parameters of the technical system. One of the variants of such models of pre-project research in the engineering space characterized by a significant reduction in the number of parameters of the technical system responsible for achieving output indicators and requirements of CALS technologies is proposed. The scope of the model implementation within the framework of a human-machine interface using data of distinctive features and their parameters distributed in the operational area of a technical system with a pronounced technical difference is proposed.
The article analyzes the electronic signature scheme for a video stream, proposed in the article by V. G. Nasennik (2021) and having the property of separability, i.e. the ability to select an arbitrary fragment of the video stream, in relation to which all the properties of the electronic signature are saved. The proposed technology has a fairly simple implementation and belongs to non-scalable ”fragile”methods, while authentication information is not embedded in the image, but is transmitted in metadata. The article analyzes the possible vulnerabilities of the scheme and suggests possible ways to eliminate them. The proposed modifications of the electronic signature scheme of the video stream make it possible to exclude editing of the sequence of frames or to replace the video stream, while the order of complexity of the modified scheme remains the same.
Introduction. The search for technical solutions to improve the positioning accuracy of devices using the infrastructure of base stations of existing and planned cellular radio networks is an important area of research and development in the last decade. Interest in network positioning is due to the unreliable reception of signals from global navigation satellite systems in dense urban areas. The instrument for experimental approbation of technical solutions is the software and hardware of the SDR software defined radio technology. This work is a continuation of the research on the use of SDR technology for network positioning tasks in terms of issues related to the reception and processing of reference signals of the LTE standard. Materials and methods. The paper presents an experimentally tested sequence of procedures for receiving and processing LTE reference signals in order to collect primary differential-range measurements for software implementation on a mock-up of a user device built using SDR software defined radio technology. Results. The software implementation of the presented procedures underlies the SDR layout of the user device for receiving and processing reference signals of the LTE standard. Discussion and conclusions. Approbation of the operation of the SDR testbed of the user device in laboratory conditions with SDR testbeds of base stations, as well as in the field with base stations of functioning LTE networks, makes it possible to search for technical solutions to improve the accuracy of positioning.
The object of the research is an alternative energy source, energy control and distribution devices in relation to intelligent power sources of wireless sensor networks. The aim of the work is to develop a technical solution for an intelligent power supply to improve cybersecurity and energy efficiency in telecommunications. Results of the work: a schematic diagram of an intelligent power supply for wireless sensor networks in a virtual environment has been developed; simulation modeling of physical processes using a computer-aided design system, parameterization and optimization of the power supply source has been performed. The given behavioral models allow the use of any software environment for circuit modeling. The developed behavioral model of the power supply circuit of wireless sensor networks based on the LT3980 chip can be used to create similar devices. Modeling makes it possible to increase the reliability of choosing the optimal solution for the structure, increase reliability even at the design stages, optimize the technical characteristics, design of the device being developed and reduce its cost.
The paper presents an improved version of the CSI-FiSh threshold signature offered by L. De Feo and M. Meyer in 2020. In the proposed scheme, public and private keys are additionally updated avoiding the case of compromising a dealer. It is also proposed to eliminate the sequential information transfer between participants when signing and replace it with an assembly with the participation of the dealer. Experimental results showing the effectiveness of the proposed approach and the assessment of the resulting scheme safety are presented.
The basic concepts in the field of software quality testing and evaluation are defined. In particular, the concepts of verification, validation and software lifecycle and their role in the testing process are considered. The concept of an artifact in the software lifecycle is considered. The Russian and international standards in the field of software quality assessment are taken into account. The existing methods of software verification are regarded: expertise, static analysis, formal methods, dynamic and synthetic methods.
An overview of software quality assessment methods used in software development and testing cycles is presented. Functional and administrative factors affecting software quality are also considered. The article lists modern testing automation tools that can be used today. The review material of the article will be useful for software developers, novice testers and related specialists.
One of the most common methods for automatically determining the type of content in incoming traffic and limiting it is the system of black and white lists. Blacklists and whitelists are a set of “trusted” or “untrustworthy” rules for classifying data within information packets by which unwanted content is filtered. The object of the research is the existing traffic that will be divided into two groups in the form of "True-traffic" and "False-traffic". According to the compiled black and white lists, the number of hits of each traffic unit is determined and according to these data, an assessment of this approach to analysis is given. In accordance with the list of blocked signatures, the number of true blockings has high positive indicators and the number of false positives is close to zero with a VPN connection and starting a proxy server you can bypass content filtering, with transferring the resource to another URL blocking doesn’t occur, that was revealed on the cyberpolygon created to study the tasks of content filtering.