Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search
No 4 (2021)
3-10 218
Abstract
The paper proposes a methodological approach to the development of a model for assessing the investment attractiveness of innovative projects based on the provisions of fuzzy logic and set theory. Methods and models for evaluating the investment project effectiveness are described. The limitations of existing methods due to the uncertainty of the external environment are presented. An example of a quantitative assessment of a specific innovative project investment attractiveness is given.
11-22 224
Abstract
The article analyzes the digital part of the "Applied Mathematics and Computer Science" educational program competence model at different levels of education. The most popular competencies are identified and the digital economy competencies necessary for graduates of the educational program based on the analysis of the employers’ requirements are formulated, taking into account the level of education. The proposals for updating the educational process in applied mathematics and computer science are presented considering the current trends in the development of the digital economy.
23-31 475
Abstract
Several neural network architectures provide high-quality speech synthesis. Several neural network architectures provide high-quality speech synthesis. In this article, emotional speech synthesis with global style tokens is researched. A novel method of emotional speech synthesis with emotional text embeddings is described.
32-42 209
Abstract
The most common implementation sequence of science-intensive projects in the field of engineering and instrumentation in the framework of small enterprises is considered. The reasons for the existing constraints affecting the quality of complex projects implementation are considered. A model for formalizing the information transformation field of the initial data of scienceintensive projects having a significant impact on the expected results is proposed.
43-55 324
Abstract
In this paper the wireless MIMO channel modeling using the open-source model implementation QUADGIGA is considered. The obtained impulse responses are presented and used for channel parameters estimation. The validation of the MIMO channel modeling was evaluated by calculating the correlation matrix and CDF of channel capacity in different configurations. Statistical distribution of magnitude and the elements phase of the MIMO channel matrix are evaluated numerically by histogram.
56-68 256
Abstract
MIMO systems based on lens antennas are very promising for 5G networks. Some scientific papers have already been devoted to the problem of channel estimation in MIMO systems based on hemispherical lens antennas. However, Luneburg multipath lens antennas are also a promising type of lens antennas for 5G networks. This paper presents the results of channel estimation features research in 5G MIMO-OFDM systems with Luneburg lens antennas. The research results of six different interpolation methods effectiveness for estimating the channel characteristics based on pilot signals and MIMO detectors (Neumann, conjugate gradients, MMSE) in a 5G cellular communication system of the millimeter range are presented.
69-75 502
Abstract
In today's circumstances, operational personnel often face crimes violating the constitutional rights of citizens, including violation of the telephone conversation secrecy. Documentation of these crimes implies that field investigator has special knowledge in the sphere of computer technology. When documenting criminal actions, it is necessary to take into account the type of crime characteristics mentioned in this article.
76-83 198
Abstract
The theory of quantum computing is being actively developed. Despite the fact that quantum computing device has some peculiarities, any task designed for a classical computer can be reproduced on a quantum system. The aim of the research is to develop a methodology for constructing models of quantum systems simulators using hardware simulators. The subject of this research is methods for constructing quantum computing devices and systems. In the course of the research, the system analysis methods and computer modeling, methods of object-oriented design were used. Modern high-level languages were used to solve the problems of constructing a modular quantum system with an open architecture. The work of a quantum microarchitecture using an algorithm for optimizing a quantum computational process has been developed and modeled. A universal methodology for modeling algorithms of a quantum nature using the hardware core and requirements for the mutual operation of software and hardware components for the efficient operation of a quantum system is derived.
84-86 218
Abstract
A very simple scheme of a video stream electronic signature is proposed allowing us to isolate any continuous fragment from the video stream in respect of which the property of an electronic signature is preserved not only with respect to establishing authorship and the absence of modification of each individual frame but also the absence of editing i.e. changing the sequence of frames.
87-94 336
Abstract
Symbol synchronization algorithm using complexes envelop samples without PLL was proposed. Two different symbol synchronization algorithms were compared. A dependency of the bit error rate on white gaussian noise is given.
95-106 265
Abstract
One of the urgent problems of information security at the moment is the lack of a unified approach for predicting computer attacks that is confirmed by both international and Russian experts as well as by practice. The paper proposes a mathematical model describing the dynamics of the computer attack in time built on the basis of the Diffusion of Innovations Theory. The substantiation of the possibility of using the Diffusion of Innovations Theory is given; the specifics of cybercrimes from other types of crimes are described. The adequacy of the proposed model is confirmed, in particular, by full-scale modeling of cyber-attacks on the organization's resources via the Internet site. The data of practical experiments confirm the mathematical model; in particular, the probability function of the cyber-attack implementation in time, i.e. the change in the number of infected nodes in time can be approximated using an s-shaped Pearl curve or a cascade model. The optimality of this approximation is proved by the method of least squares.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)