AUTOMATING THE PROCESS OF ESTABLISHING DATABASE ACTUALIZATION SERVICES
S.S. Alikin, Moscow Technical University of Communications and Informatics, post-graduate; firstname.lastname@example.org
The article describes the typical structure of a contact center, a classification of services provided by given contact center and an algorithm for establishing database actualization services. As a means to accelerate the establishment of such a service in the various models of contact centers that are structurally similar to the model referred to as typical, it is proposed to use a heuristic algorithm based on the expert system. The article defines stages of the algorithm, and a list of requirements that must be satisfied in order to reduce the establishment of services while maintaining quality of the result of its work.
Key words: contact center, service creation, relational database, database actualization, heuristic algorithm, expert system, fuzzy logic.
SOME FEATURES IN PROVIDING INFORMATION SECURITY IN PROFESSIONAL TETRA NETWORK
R.A. Belfer, Bauman University (BMSTU), senior researcher, Ph.D; email@example.com
D.V. Sukhodolsky, BMSTU, student; firstname.lastname@example.org
N.O. Pozdeev, BMSTU, student; Nikitapozdeev@list.ru
High demands of some users to security in professional mobile radio and features of TETRA standard causes some differences in information security and compared how it is implemented in other wireless communication networks. The paper is devoted to analytical overview of scientific publications and documents of international organizations in terms of meeting these requirements through encryption and encryption key management.
Key words: information security, Private Mobile Radio (PMR), TETRA, TErrestrial Trunked Radio, Trunked Mode Operation (TMO), Direct Mode Operation (DMO), air interface (AI), end-to-end encryption.
ON THE BEST ENCRYPTION AND ERROR CORRECTION ALGORITHMS
Yu.M. Braude-Zolotarev, independent expert, Ph.D.; email@example.com
The article recommended algorithms most simple in realization, based on ASIC chips. Safe protection from the radio combat devices on the basis of the cryptosafe random numbers generators with non-linear and non-stationary generator polynomials, which support absolute cryptosafety.
Key words: radio electronic struggle, perfect encryption, imitoprotection, protection from barrage interference. True random number sequence generator, Key update, Error correction code, Low Density Parity Check Codes, Random Frequency Hopping and Time Hopping, implementation of algorithms on ASIC.
SPECIFICS AND CURRENT STATE OF ELECTROMAGNETIC MONITORING OF MOSCOW AND MOSCOW REGION
O.A. Grigoriev, FMBA of Russia, Federal Medical Biophysical Center, Head of Department, associate professor, Dr. Sci. (Biol.); firstname.lastname@example.org
M.Yu. Maslov, Radio Research & Development Institute Samara Branch, Head of the scientific and educational center, associate professor, PhD; email@example.com
M.Yu. Spodobaev, Radio Research & Development Institute Samara Branch, Director, PhD; firstname.lastname@example.org
Yu.M. Spodobaev, Radio Research & Development Institute Samara Branch, Chief researcher of the scientific and educational center, professor, Dr.Sci. (Tech.); email@example.com
The letter deals with the problems control of the electromagnetic fields in modern cities. On the example of Moscow, a detailed analysis of the factors that determine the electromagnetic environment in the city and beyond. Clearly identified problems of the modern state of the problem of electromagnetic monitoring and ongoing ways to address, such as the development of regional regulations and methods, the development of fragments of geo-ecological mapping of the radiation sources and the fields they created , with reference to an electronic map of the city. The analysis revealed a critical situation for the population of the mega polis from the point of view of the impact generated by the considered networks of electromagnetic fields, and also identified areas for further work.
Keywords: electromagnetic fields, electromagnetic pollution, electromagnetic monitoring, electromagnetic prediction, geo-ecological mapping.
ORGANIZATION OF THE INFRASTRUCTURE OF NFC-SERVICES ON TRANSPORT
D.V. Gromov, “Processing Technologies” CJSC, Head of the Research Department
V.V. Kaledin, Central Research Institute of Communications, Deputy Head
A.I. Skorodumov, Infocommunication Union, Chief executive officer, Dr.Sci.(Tech.)
The paper is devoted to the analysis of the current state and the trends of the NFC-based services on transport in Russia. The presented results are based upon the research study performed for the Infocommunication Union. The paper is devoted to the detailed analysis of two important components of any NFC-based transport service: a transport application (applet) and the trusted service manager (TSM). The role and structure of the mentioned components are described and the recommendations are given. Furthermore, the article stresses the importance of the certification of the developed solutions as it allows for a seamless interaction of all components regardless of the particular implementation of the service. Finally, some tendencies in the development of transport services are outlined.
Key words: contactless payments, Near Field Communication (NFC), Trusted Service Manager (TSM), transport applications.
Comparison of spectrum monitoring coverage features of AOA and TDOA geolocation methods
V.A. Kozmin, “IRCOS” JSC, Director for scientific works, docent, PhD.; firstname.lastname@example.org
A.P. Pavlyuk, “IRCOS” JSC, consultant, PhD.; email@example.com
A.B. Tokarev, “IRCOS” JSC, section chief, docent, PhD.; TokarevAB@ircoc.vrn.ru
The article is devoted to the comparison of spectrum monitoring coverage features of AOA and TDOA geolocation methods. Advantages and disadvantages of such systems in monitoring networks containing different number of fixed monitoring stations that interact with mobile monitoring stations are shown. Recommendations are formulated concerning implementation of such systems in various conditions. Results of this work can provide the essential help to communication administrations under development of their monitoring networks taking into account that still there is no experience in the world concerning practical implementation of TDOA systems for needs of the terrestrial spectrum monitoring.
Keywords: spectrum monitoring, monitoring network, monitoring station, coverage by monitoring, direction finding, geolocation, АОА, TDOA
THE CLASSIFICATION CONCEPTS OF IDENTIFICATION AND AUTHENTICATION SYSTEMS ACCORDING INFORMATION SECURITY REQUIREMENTS
A.G. Sabanov, Company Aladdin R.D., Deputy CEO; Bauman University (BMSTU), docent, Ph.D.; Sabanov@aladdin-rd.ru
Principles of user identification and authentication systems classification according to signs of achievement of aims and attainment of objectives of information security are given. User access management is shown to be the main purpose of identification and authentication systems. The tasks of ensuring the availability, integrity and confidentiality of restricted information in the design and operation of identification and authentication systems are considered.
Key words: classification, system, identification, authentication, information security, availability, confidentiality, integrity.
HIGH FREQUENCY EQUALIZATION OF DIGITAL SIGNAL IN TRANSMISSION LINES
V.P.Timoshenkov, National Research University of Electronic Technology, docent, Ph.D; firstname.lastname@example.org
U.F.Adamov, Institute for Informaition Transmission Problems RAS, professor, Dr. Sci. (Tech.); email@example.com
In this paper possibility of high frequency equalization of pulse signals in cable transmission lines are presented. It was showed that using of SiGe heterojunction bipolar transistors in transmitters and receivers is allowed to increase transmission speed to 12.5 Gb/s.
Key words: RF transmission line, signal dispersion, depth of equalization eye diagramm, Shennon equation.