The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The results of development a mathematical model for transmission rate allocation downlink technology WiMAX. The novelty of the proposed model is possible preventive limit transmission rate allocated to the service flows of the user stations in the downlink by using the WiMAX technology linear or linear-quadratic objective function. Using the mathematical model is directed to allocation between subscriber...
In recent years the study of infocommunication systems has been devoted a lot of work. However, until now not been proposed model adequately describing information and communication systems and allowing to use the entire arsenal of classic methods for analyzing nonlinear dynamic systems. The paper proposes a new approach to the analysis of the behavior of infocommunication systems with the TCP protocol...
Traffic analysis using classical methods of queuing theory supposes independent or at least uncorrelated traffic counts. This article is about using wavelet transform for decreasing correlation in strongly correlated traffic. Also shown the transform of the probability density function of the source of traffic using two-dimensional probability density function and a “model” distribution based on cumulant...
This paper proposes the method of the multifractal division of the computational complexity classes, which is formalized by introducing the special equivalence relations on these classes. Exposing the self-similarity properties of the complexity classes structure, this method allows performing the accurate classification of the problems and demonstrates the capability of adaptation to the new advances...
Organizational issues of the backhaul network using Long Term Evolution technology are considered. Backhaul connections for different network segments are analyzed. A model of the backhaul network using Multiprotocol Label Switching technology is proposed to form the transport basis for existing networks. The bandwidth and transporting performance of the network is estimated.
The article analyzes the different models of collecting information from wireless sensor networks. The article examined the data collection model based on a schedule that is suitable for the monitoring parameters. We also consider the model of data collection on request, model data collection event, the adaptive model of information gathering, as well as hybrid model information collection allows...
In this paper the approach of the scalability improvement of the hierarchical queue management solutions on telecommunication network routers interfaces is presented. Decision is based on usage of hierarchical goal coordination method, in which was proposed usage of the quadratic optimality criterion. It allows ensuring a more balanced queues load that helped to reduce the number of coordination iterations...
This paper proposes an approach to solve the problem of LTE EPS network parametric synthesis taking into account self-similar properties of multiservice traffic. The problem is solved with the known source data such as network topology, traffic routes, statistical data on the demand for information and communication services. The article proposes the calculation expressions to determine the parameters...
Overlay solutions of SDN-based networks became very popular. Controller as a centralized management devices gather information about network topology and current network state. Overlay network have a lot benefits however the using of classical traffic engineering principles for traffic management in Software-Defined Network is becoming problem. The physical network does not automatically adapt to...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
This work considers methods to detect unknown signals in cognitive radio networks. These methods can be applied when taking decision about presence of a signal in the frequency channel when monitoring radio spectrum. The problem of uncertainty can appear when monitoring spectrum. A way of overcoming a priori uncertainty that arises when monitoring the radio spectrum is proposed.
nowadays, privacy violations caused by third party services are usually addressed with blacklist approaches. Those approaches have limitation, as they are hard to maintain and need to be frequently updated to provide relevant information. Knowing these limitations, we study ability to identify third-party web trackers having corpus of http request between web resources and associated cookies. Cookies...
In this paper a method of evaluating connection quality of IP-networks is considered. The mathematical model of the functioning of the network was made and the estimation of the quality parameters of its work for various values of subscriber traffic. In particular, the algorithm of calculating the delay time of the packet transmission network was made when using the quality assurance mechanisms IntServ...
The paper discusses the issues of technical invariance piezoresonance devices of infocommunication systems based on the use of multifrequency functional-algorithmic methods.
The main problems of practical use of pseudorandom codes in modern data transmission systems are considered. The existing methods of generating pseudorandom sequences are analyzed. Physical model of pseudorandom codes in Euclidean space is developed. This model is displayed like carriers of code words in the form of pieces of realization of pseudorandom processes with a limited range.
in this paper we analyse possibilities of application of post-quantum code based signature schemes for message authentication purposes. An error-correcting code based digital signature algorithm is presented. There also shown results of computer simulation for this algorithm in case of Reed-Solomon codes and the estimated efficiency of its software implementation. We consider perspectives of error-correcting...
This paper presents improvement of the high nonlinear S-boxes generation method by the appropriate selection of the criteria application order which decreases the required computation power for S-box generation. The proposed modification allows generation of a byte S-box with nonlinearity 104, algebraic immunity 3 and maximum of difference distribution table 8 within approximately 30 minutes of a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.