The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of Things (IoT) is a concept of communications between multiple devices equipped with sensors and actuators for the purpose of convenience and economic benefits. In connection with the rapid development of IoT concept it becomes necessary to use those or other instruments for the control and management of IoT. Considered scenario is based on the interaction between the central element (smart...
This paper describes routing programming solutions in the Mininet virtualized software-defined network. There are two challenges in implementing SDN into convergent LTE/WiFi network. The first challenge is measuring the QoS parameters by means of external network load monitoring systems. The second challenge is disuse of QoS-based routing by vendors because of high requirements of real-time load balancing...
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
An electrically tuned antenna for mobile handsets working in four low and one high LTE frequency bands is described. The PIFA-type antenna contains high and low-frequency branches. A tuning element is connected to the low-frequency branch. The proposed antenna operates at one of low-frequency bands depending on state of the tuning element, keeping tuning on the high-frequency band. A varactor and...
In this paper, we investigated error probability bounds for sparse code multiple access (SCMA) signals. SCMA is one of proposed non-orthogonal multiple access schemes for Fifth generation (5G) wireless communication standard. This scheme allows to increase the number of active users inside a given time-frequency resource. For AWGN and Rayleigh (without diversity) channels, we calculated union bounds...
The authors use the definition of high-level vulnerability which they introduced in previous publications and apply it for software-defined networking (SDN) in the context of telecommunication networks model row evolution. The analysis of publications devoted to SDN vulnerabilities showed that, in general, they are a review or an enumeration of base protocol OpenFlow errors. It is established that...
Analysis of experimental results of the binary noise-immune coding with one-dimensional modulation best achievements points out the impossibility of achievement the continuous Gaussian channel parameters of such scheme in practice. In the paper is exhibited that changeover to more effective two-dimensional non-binary PAM modulation with ternary noise-immune codes in each quadrature branch of a modem...
A routing algorithm based on Q-routing paradigm is proposed for ad-hoc dynamically changing networks. The technique derived from Full Echo approach is used to enhance exploration capacity and prevent instability of routing under high load conditions. The performance of routing is increased by random polling of neighbors according to the local estimates of the average delivery time in the network.
Honeypot technology is one of the main mechanisms of computer security. It is certain resource, which should be attacked or explored illegally. The research provides the version of Honeypot implementation based on proxy-server. The target of paper is emulation of intruder detection system and analysis of potential violator behavior. As a result, statistics of attacks sources has been collected and...
An original concept of building a multi-channel receiving modules of the C-band active phased array antenna (APAA) for on-board and ground-based communication systems and radar is presented. Construction of multipath receiving APAA is impossible without solving the problem of building multi-channel receiver modules. The number of beams in the system determines the number of phase shifters involved...
This paper presents method for acquisition and processing status data of mobile devices. In this research smartphone, tablet PC, VANET or MANET nodes are regarded as mobile devices. The proposed method utilizes gathering information about state of hardware modules and network around the mobile device. Then the acquired information is processed in order to determine the metrics of mobile device which...
The results of research and application of fuzzy logic on the control systems in the «atypical» (not in technical) area are offered. This is an estimation of testing diagnosis results within control system of education quality. To increase the accuracy and reliability of estimation of results of a given study in competence-based format, it is possible to use approved approaches and methods from contiguous...
This article is devoted to the effectiveness of security systems using Honeypot technology. There are studied basic structures of security systems, which use Honeypot technology. There is described developing process of a “trap” for VNC/RDP protocols, which main goal is to emulate remote desktops. Assembled “trap” will identify the attacker to collect information about his actions by analyzing malicious...
The research was aimed to determine the effect of an artificially added noise on the high-resolution esophageal manometry data processing algorithm. Multiple record types were verified with the different noise levels. Sensitivity and specificity of the algorithm identified based on the study results. Also was investigated how strong data from each sensor affect the outcome. For that several sensors...
Composite nanocoating of synthetic fibers for implantable materials has been developed. The coating is intended to improve the adhesion and proliferation of biological cells, which can lead to a reduction in damaged tissue regeneration time after implantation of synthetic material in the human body. The basis of the coating is a dispersion of carbon nanotubes in the protein matrix. The coating was...
Studies were performed on dependence of the biological tissues welds tensile strength, obtained at different temperatures, and denaturation temperature of bovine serum albumin (the main component of the laser solder) were conducted. BSA denaturation temperature was measured by differential scanning colorimetry.
Studies were performed on the interaction of laser solder components (bovine serum albumin and single-walled carbon nanotubes) by laser light scattering method. The formed aggregates size depends on the ratio of the albumin concentration to nanotubes concentration.
A lot of artifiicial neural networks were proposed by scientists over the last time. Each of them can cope with the tasks of limited difficulty level, determined by their properties and capabilities. The aim of this paper is to outline difference of them and to define their positive and negative sites in different tasks of identification and control.
The basis of the study is the similarity method connected with mathematical linguistics. This approach has allowed obtaining new results in the analytical geometry, which, in turn, is used in the design of machines and devices widely. The results are described briefly. Modified method is also applied of pattern recognition. The hypothesis of the human sensory system is given shortly. Architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.