Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search
Vol 17, No 2 (2023)
View or download the full issue PDF (Russian)
3-11 227
Abstract

In this article, the electrical indicators connection of the sound tracts quality used in modern measurement methods and psychoacoustic indicators of the subjective assessment potential are considered. A recommendation on the need to apply psychoacoustic assessment criteria is given as not all of them used in subjective assessment of the sound tracts quality can be measured using objective techniques

12-21 338
Abstract

In this paper, the experience of using extreme programming as a method for developing student’s soft and hard skills is presented. The practical implementation of professional education during the participation of IT students in competitions, championships and hackathons in the field of artificial intelligence organized at the country level and by IT companies is considered.

22-36 289
Abstract

The paper proposes a new methodological approach aimed at developing simulation models of system dynamics and agent-based modeling in case an enterprise introduces an innovative patented technology in new markets. This task requires development of new business models, strategies, and communication processes. The operating models for solving these problems are implemented in the AnyLogic simulation system

37-43 190
Abstract

Statistical and heuristic decision-making methods based on measurements of the received signal physical parameters are used to determine the location of a mobile object in the Wi-Fi network. It is necessary to know the distribution laws of the measured values’ samples to use them correctly. In this paper, it is proposed to test the statistical criteria for the compliance of the sample with the normal law. Pearson and Kolmogorov criteria were applied. The obtained results confirm the proposed hypothesis.

44-50 799
Abstract

In this paper, the methods of predicting network anomalies are analyzed. Using the example of real statistical data, the stages of setting up forecasting models are shown. The effect of a DDoS attack on the destination IP-addresses’ entropy is shown.

51-58 743
Abstract

In this paper, the concept of using the method of the score-rating system to assess the achievements’ indicators formation of competencies is considered. A mathematical model of their formation is proposed and the results of the manual use experiment of the described technique are presented. As a result, the need for automation of this process has been identified and solutions necessary for the implementation of automated assessment within the subsystem of the digital profile of the student, including part of the logical database model, have been prepared. Options for scaling the presented solutions are also proposed.

59-68 214
Abstract

The problem of assessing digital maturity of employees of an educational organization of higher education (EOHE) is considered. The aim of the study is to increase the assessment of digital competencies adequacy in the task of assessing the digital maturity of the EOHE. Based on the analysis of existing technologies for assessing digital competencies, the synthesis of the author's model for assessing the digital maturity of a scientific and pedagogical employee of the EOHE was carried out. The novelty of the research lies in the development of indicators weighted system of an employee digital maturity via the construction and study of the iconic graph of the cognitive map using group expertise and the method of hierarchy analysis

69-83 202
Abstract

The paper describes some problems of operation failures of integrated circuits (ICs) and corresponding preventative measures by constructive-technological, schematic-topological methods at the early stages of design process. The issues related to the problems of IC failures caused by dielectric breakdown are considered, generalized and systematized. Some examples that can be used in practice when developing ICs to improve their reliability, taking into account current trends in the microelectronics field.

84-92 242
Abstract

The article suggests an approach by which it is possible to analyze the impact of information security on the decision management process. The use of the approach in the life cycle of the system will reduce risks and contribute to the identification of "bottlenecks" including information security. The efficiency of the approach is demonstrated by examples

93-103 303
Abstract

The problem of phishing in the Internet space is considered in this paper. The reasons for the urgency of the phishing problem, considered through the prism of an attacker, are also analyzed. Furthermore, the concept of a communication channel and its correlation with the phenomenon of phishing is defined by the example of mail attacks. The technology of the formation of an anti-phishing system is developed on the example of a model of interaction between an attacker and a user. The measures of protection against mail phishing are analyzed. PufferPhish software has been developed, which offers the integration of a security system into the process of delivering mail messages.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)