Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search
Vol 18, No 2 (2024)
View or download the full issue PDF (Russian)
3-12 225
Abstract

This paper proposes a structure of a broadband instantaneous frequency measurement receiver consisting of an analog correlator and a digital frequency estimation calculation unit. A feature of this structure is the use of only two ADCs regardless of the width of the operating frequency range. Expansion of the frequency range is achieved through the use of channels with comparators, and each channel with a comparator doubles the width of the operating frequency range. The procedure for calculating the main characteristics of a IFM receiver is given: delay time and the number of channels with comparators. Simulation results are presented showing a comparison of the standard deviation of the frequency estimation for the known broadband structure presented in the literature and the proposed structure.

13-31 235
Abstract

Global demand for higher bandwidth mobile Internet services stimulates the constant evolution of cellular technologies. Today, cellular networks are saturated with frequencies below 3 GHz. To achieve the required increase in data rates, more bandwidth is required in the higher frequency range. Due to increasing bandwidth requirements, 5th generation (5G) mobile networks are targeting the frequency range of 3 to 6 GHz (FR1). It is also planned to use frequencies in the 24-29 GHz range for 5G networks. Despite the expected widespread use of the frequency range from 3 to 6 GHz, there is little empirical data on path losses and experience in mobile radio network planning. In this paper, a methodology has been developed for determining the coverage area of the 5G network base station taking into account most equipment and signal parameters for different signal propagation models. An expression has been obtained to determine the data transfer rate in 5G-NR equipment in TDD mode. Calculations results of the coverage area are presented using the example for the city of Novosibirsk for a frequency of 4.8 GHz. The deployment problem when planning 5G network coverage is analyzed.

32-42 204
Abstract

The mathematical apparatus of the queuing networks theory is used when analyzing the hierarchical control system of communication networks. The peculiarity and scientific novelty of the constructed model lies in the fact that the limited reliability of the system elements is taken into account. The presented results of numerical calculations demonstrate the influence of the availability coefficient of the control system elements on the indicators characterizing the time of the system’s reaction upon requests related to the maintenance and operation of network facilities.

43-56 304
Abstract

The paper is devoted to the consideration of the methodology for assessing the security of speech acoustic information in the preparation of premises for private negotiations. Taking into account the disadvantages of existing approaches it is proposed to apply recognition methods based on convolutional neural networks. The paper proposes a block diagram of the stages for creating an intelligent system. The process of creating a training dataset in audio recording format with superimposed noises with different signal-to-noise ratios is described. The possibilities of the Adobe Audition audio editor and Python libraries for generating datasets are considered. It is proposed to classify spectrograms or mel-frequency cepstral coefficients of audio recordings using a neural network by the percentage of speech intelligibility in order to automate the process of assessing the security of speech acoustic information. To achieve the desired result, it is planned to train a neural network on various data, conduct a comparative analysis with the existing approach, evaluate the performance of the system and validate the results. The proposed approach and its practical application will significantly improve the quality and expand the conditions for the application of the security assessment of speech acoustic information.

57-68 296
Abstract

Progress in the development of modern information technologies is directly related to the use of resource-intensive applications in science-intensive research, as well as in industrial applications. Currently, there is an acute problem of analyzing large volumes of geophysical data and increasing the productivity of systems for their study. One of the ways to solve this problem is to use multiprocessor computers and multi-machine computing systems capable of performing parallel, including distributed data processing. The paper presents a description and implementation of a computational model for parallel processing of seismic data based on the LuNA system for the automatic construction of parallel programs.

69-78 276
Abstract

This article presents a developed method for assessing code coverage during fuzztesting of software using hardware virtualization. The tested software is considered as a black box. The proposed method's feature is the ability to monitor the state of the virtual machine in which the fuzz testing is carried out, including monitoring the processor's state and input data in real-time. The experiments conducted showed that the developed method allows us to obtain an accurate assessment of code test coverage comparable to the static instrumentation-based method, which is only applicable when conducting white-box fuzz testing.

79-87 214
Abstract

The paper compares various methods for constructing laser emitters in pulsed semiconductor rangefinders. Two semiconductor laser emitters with a wavelength of 905 nm, which are part of a pulsed range finder, are considered. The optical scheme of the transmitting and receiving channels of the range finder consists of an aspherical lens and an objective. The difference between laser emitters is the presence of a built-in cylindrical lens in one of them. The results of measuring the distance to the target by a rangefinder with both options for constructing emitters under various conditions are demonstrated.

88-102 374
Abstract

The existing methods for assessing the level of trust in the information security incident management process and in the processes of information security event monitoring systems are extremely limited. These methods are based on an expert assessment and are periodic in nature with a long-time interval between assessments. The purpose of this study is to develop a methodology for assessing the level of trust in the information security incident management process, which is suitable for an automated assessment with minimal expert participation. As a result of the work, a methodology has been developed to assess the level of confidence in the information security incident management process, which includes a list of trust criteria and metrics for their assessment. The methodology is based on the SOMM methodology and GOST ISO/IEC 27035. The developed methodology is based on a three-stage assessment of trust indicators: assessment of trust metrics, assessment of trust criteria, assessment of the level of trust in the information incident management process.

103-112 223
Abstract

This article deals with the issues of constructive digital transformation of the learning process using educational online platforms. The metric model based on the risk thermometer embedded in the platform is a new approach in the field of educational technological design. The practical significance of the educational process consists in obtaining relevant information for decision-making on the development of online educational platforms, which in turn will ensure the effective organization and improve the effectiveness of the educational process.

113-126 226
Abstract

This article discusses the reversible data hiding (RDH) method for raster images. The statistical properties of the container are taken into account by dividing the image into coherent regions using a wildfire method and collecting statistics of the least significant bits to form an embedded sequence with a given distribution. The INP interpolation method is used to divide the image into a part for collecting statistical properties of the container and a part for embedding information. Obtaining a sequence of bits with a given distribution is provided by an arithmetic decoder. The constructed stegosystem has an embedding capacity of 0.6 bits/pixel. RS steganalysis is carried out on the basis of BOSS_v1.01 images and the properties of the resulting containers are assessed based on visual distortion indicators.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)