scispace - formally typeset
Search or ask a question

Showing papers by "St. Petersburg State University of Telecommunications published in 2021"


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a decentralized data management system for smart and secure transportation that uses blockchain and the Internet of Things in a sustainable smart city environment to solve the data vulnerability problem.
Abstract: Smart cities provide citizens with smart and advanced services to improve their quality of life. However, it has been observed that the collection, storage, processing, and analysis of heterogeneous data that are usually borne by citizens will bear certain difficulties. The development of the Internet of Things, cloud computing, social media, and other Industry 4.0 influencers pushed technology into a smart society’s framework, bringing potential vulnerabilities to sensor data, services, and smart city applications. These vulnerabilities lead to data security problems. We propose a decentralized data management system for smart and secure transportation that uses blockchain and the Internet of Things in a sustainable smart city environment to solve the data vulnerability problem. A smart transportation mobility system demands creating an interconnected transit system to ensure flexibility and efficiency. This article introduces prior knowledge and then provides a Hyperledger Fabric-based data architecture that supports a secure, trusted, smart transportation system. The simulation results show the balance between the blockchain mining time and the number of blocks created. We also use the average transaction delay evaluation model to evaluate the model and to test the proposed system’s performance. The system will address residents’ and authorities’ security challenges of the transportation system in smart, sustainable cities and lead to better governance.

50 citations




Journal ArticleDOI
01 Feb 2021
TL;DR: In this article, the authors study digital reforms in the agro-industrial complex of Russia and the assessment of opportunities and threats for the sustainable socio-economic development of the country.
Abstract: The articel is devoted to the study of digital reforms in the agro-industrial complex of Russia and the assessment of opportunities and threats for the sustainable socio-economic development of the country. The article also considers business cases of successful digitalization of agriculture and assesses the economic effects of digital technologies, and forms a scenario for the further development of the agro-industrial complex taking into account global trends in the development of the digital economy.

6 citations


Journal ArticleDOI
TL;DR: A study of early Byzantine commentaries to the episode with Jonah and a gourd (Jonah 4:6-11) shows that the style, method, or context of each commentary appears to be passing the traditional bounds of Bible interpretation as mentioned in this paper.
Abstract: Many modern scholars consider the Old Testament book of Jonah being written in a boldly parodic manner. The narrative engages many details that sound humorous for a modern reader. However, from the standpoint of late Antique and early Medieval patristic exegesis, it is often unclear whether Byzantine interpreters perceived such passages laughable or at least inappropriate for a prophetic writing. This study presents a few examples of early Byzantine commentaries to the episode with Jonah and a gourd (Jonah 4:6–11). None of the commentaries expresses any explicit amusement caused by the discussed text. However, the style, method, or context of each commentary appears to be passing the traditional bounds of Bible interpretation. The earlier interpreters adhere to the most expected moral reading of Jonah 4, but they use epithets, metaphors, or omissions, which produce the effect of paradox comparable to the biblical wording itself. The later commentaries tend to involve unexpected and even provocative senses. In such interpretations, God can be thought of as being able to play with a human or even to fool and deceive. What seems us humorous in the Bible, Byzantine commentators take primarily as a paradox, which they did not explain or remove but elaborate further paradoxically. The later an interpreter is, the bolder his paradoxical approach appears. The results of the study provide some clues to understanding how the interpretation of humorous, parodic, or ironical passages were developing in the history of Byzantine intellectual culture.

5 citations



Proceedings ArticleDOI
30 Jun 2021
TL;DR: In this article, the correlation matrices of the input signals were approximated by matrix of a special type related to Toeplitz and block-to-toplitz matrices.
Abstract: To reduce the computational complexity of direct methods for adapting linear equidistant antenna arrays, the correlation matrices of the input signals were approximated by matrices of a special type related to Toeplitz and block-Toeplitz matrices. It is shown that the sample correlation matrices used in adaptation, due to the use of samples of limited length in their estimation, do not belong to matrices of a special type and can be approximated by them with limited accuracy. The accuracy of such an estimation is estimated and the simulation of direct methods using the MATLAB environment is carried out, on the basis of which recommendations are given on the use of direct methods for adapting antenna arrays.

4 citations


Journal ArticleDOI
31 Mar 2021
TL;DR: This paper compares various ML methods for traffic prediction using the ensemble models Random Forest, Boosting, Gradient Boosting and Adaptive Boosting to find a solution for a regression problem using the quality indicators RMSE, MAE, and coefficient of determination.
Abstract: Future networks bring higher communication requirements in latency, computations, data quality, etc. The attention to various challenges in the network field through the advances of Artificial Intelligence (AI), Machine Learning (ML) and Big Data analysis is growing. The subject of research in this paper is 4G mobile traffic collected during one year. The amount of data retrieved from devices and network management are motivating the trend toward learning-based approaches. The research method is to compare various ML methods for traffic prediction. In terms of ML, to find a solution for a regression problem using the ensemble models Random Forest, Boosting, Gradient Boosting, and Adaptive Boosting (AdaBoost). The comparison was based on the quality indicators RMSE, MAE, and coefficient of determination. In the result Gradient Boosting showed the most accurate prediction. Using this ML model for mobile traffic optimization could improve network performance. Keywords—machine learning, optimization, Internet, traffic. Article info Article in Russian. Received 09.03.2021, accepted 24.03.2021. For citation: Alekseeva D., Marochkina A., Paramonov A.: Traffic optimization applying machine learning methods // Telecom IT. 2021. Vol. 9. Iss. 1. pp. 1–12 (in Russian). DOI 10.31854/23071303-2021-9-1-1-12. ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ Март 2021 Том 9 No 1 ISSN 2307-1303 http://ijitt.ru/ Алексеева Д. Д., Марочкина А. В., Парамонов А. И. Оптимизация мобильного трафика методами машинного обучения 3 Введение В настоящее время методы машинного обучения (МО) с успехом применяются в разных сферах [1]. К примеру, в работе [2] при использовании алгоритмов МО для прогнозирования аварий в системах теплоснабжения. В другой работе представлено применение МО для уменьшения количества опасных событий (таких как, например, дефект рельс на железнодорожном пути) за счет прогнозирования редких опасных отказов на основе обработки больших массивов данных [3]. Также алгоритмы МО применяются для решения задач антивирусного сканирования [4], при поиске залежей углеводородов [5], в бизнесе [6], и т. д. Такой интерес к МО связан с его высокими показателями эффективности при анализе больших данных (Big Data). Что касается сферы телекоммуникаций, то будущие сети, сети шестого поколения и сети 2030, представляют высокие требования к задержкам, безопасности, надежности соединения и т. д. Также, в связи с увеличением количества устройств в телекоммуникационной сети и, как следствие, экстремальным ростом информационных потоков, стоит задача найти более эффективные способы управления и контроля сети. Одним из решений этой задачи является применение МО для прогнозирования трафика с целью дальнейшей оптимизации. Алгоритмы МО способны обрабатывать большой объем данных и находить зависимости, которые человеку сложно найти вручную. Также, такие алгоритмы находят лучшее решение конкретной проблемы благодаря статистическому анализу большого объема данных. В данной работе представлено сравнение нескольких ансамблевых алгоритмов МО – Случайный лес, Bagging, Gradient Boosting, и Adaptive Boosting. Алгоритмы обучались на статистических данных, взятых с сайта kaggle.com. В данных содержится информация о трафике из 57 ячеек сети связи 4G, которые собирались в течение одного года. Статья состоит из трех частей. В первой части говорится о способах машинного обучения, об используемых в работе алгоритмах, а также о показателях качества модели. Во второй части представлен обзор статей. Третья часть описывает работу по предсказанию трафика. 1 Технология машинного обучения 1.1 Способы обучения Существует несколько способов машинного обучения – это обучение с учителем (Supervised Learning), без учителя (Unsupervised Learning), а также обучение с подкреплением (Reinforcement Learning). Стоит отметить, что также существуют смешанные способы обучения, которые образуются соединением обучения с учителем и без него. К примеру, к такому способу относится обучение с частичным привлечением учителя (Semi-supervised learning), которое наследует характеристики у способов, лежащих в основе. В данной работе мы не будем подробно останавливаться на данном способе, далее представлены определения трех основных способов обучения. Обучение с учителем. Данный способ подразумевает, что в качестве данных для обучения применяются данные, в которых уже определены зависимости

3 citations


Proceedings ArticleDOI
07 Jun 2021
TL;DR: The development of technologies makes it possible to increase the power of information processing systems, but also an increase in the number of errors and vulnerabilities that can allow an attacker to attack the system and gain access to confidential information as discussed by the authors.
Abstract: The development of technologies makes it possible to increase the power of information processing systems, but the modernization of processors brings not only an increase in performance but also an increase in the number of errors and vulnerabilities that can allow an attacker to attack the system and gain access to confidential information. White-Box cryptography allows (due to its structure) not only monitoring possible changes but also protects the processed data even with full access of the attacker to the environment. Elliptic Curve Cryptography (ECC) due to its properties, is becoming stronger and stronger in our lives, as it allows you to get strong encryption at a lower cost of processing your own algorithm. This allows you to reduce the load on the system and increase its performance.

3 citations


Journal ArticleDOI
31 Mar 2021
TL;DR: In this paper, the main losses in planar optical waveguides, the reasons for their occurrence, as well as approaches to their reduction are determined, and the advantages and disadvantages of using nonspecialized polymeric materials for general use are revealed.
Abstract: The article presents the development prospects of planar optical waveguides for high-speed data transmission systems optoelectronic buses by polymer materials. The advantages and disadvantages of using nonspecialized polymeric materials for general use are revealed. The polymer planar optical waveguides fabrication technologies are proposed. The main losses types in planar optical waveguides, the reasons for their occurrence, as well as approaches to their reduction are determined. Using the example of PDMS polymer and soft lithography technology, the technological process critical stages of polymer planar optical waveguides production are noted, which contribute to an scattering losses increase. For each stage, algorithms are proposed to prevent an scattering losses increase. These algorithms were implemented in practice in the manufacture of layouts of polymer planar optical waveguides of the optical-electronic data transmission bus.

3 citations


Journal ArticleDOI
26 Sep 2021-Sensors
TL;DR: In this paper, a modified wavelet synthesis algorithm for continuous wavelet transform is proposed, allowing one to obtain a guaranteed approximation of the maternal wavelet to the sample of the analyzed signal (overlap match) and, at the same time, a formalized representation of the wavelet.
Abstract: In this paper a modified wavelet synthesis algorithm for continuous wavelet transform is proposed, allowing one to obtain a guaranteed approximation of the maternal wavelet to the sample of the analyzed signal (overlap match) and, at the same time, a formalized representation of the wavelet. What distinguishes this method from similar ones? During the procedure of wavelets’ synthesis for continuous wavelet transform it is proposed to use splines and artificial neural networks. The paper also suggests a comparative analysis of polynomial, neural network, and wavelet spline models. It also deals with feasibility of using these models in the synthesis of wavelets during such studies like fine structure of signals, as well as in analysis of large parts of signals whose shape is variable. A number of studies have shown that during the wavelets’ synthesis, the use of artificial neural networks (based on radial basis functions) and cubic splines enables the possibility of obtaining guaranteed accuracy in approaching the maternal wavelet to the signal’s sample (with no approximation error). It also allows for its formalized representation, which is especially important during software implementation of the algorithm for calculating the continuous conversions at digital signal processors and microcontrollers. This paper demonstrates the possibility of using synthesized wavelet, obtained based on polynomial, neural network, and spline models, during the performance of an inverse continuous wavelet transform.

Journal ArticleDOI
31 Mar 2021
TL;DR: A method for assessing the achievable data transfer rate, taking into account the mutual influences of network nodes, as well as a method for constructing the logical structure of the network are proposed.
Abstract: The article analyzes the problems of implementation access networks in high-density communication networks, proposes a method for assessing the achievable data transfer rate, taking into account the mutual influences of network nodes, as well as a method for constructing the logical structure of the network. The possibility of constructing a network model in the form of a cell structure for which the methods of percolation theory are applicable is considered. The use of these methods makes it possible to obtain a structure with specified properties, which makes it possible to ensure the required quality of network functioning

Proceedings ArticleDOI
30 Jun 2021
TL;DR: In this paper, an assessment of the possibility of improving performance through the use of various caching methods is made, as well as experimental research and analysis of the results obtained, and the results of experiments are presented -testing was carried out on a deployed architecture of a distributed storage with two types of caching, the results are combined in graphs.
Abstract: The object of the research is distributed software-defined storage systems, as well as methods of caching disk devices. It is important for improving the performance of storage systems, which is relevant in modern conditions. In this article, an assessment of the possibility of improving performance through the use of various caching methods is made, as well as experimental research and analysis of the results obtained. The parameters of the application's operation with the disk subsystem have been determined. The results of experiments are presented - testing was carried out on a deployed architecture of a distributed storage with two types of caching, the results are combined in graphs. Conclusions are drawn, including on the prospects for further research.

Journal ArticleDOI
TL;DR: In this article, the authors described the synthesis and characterization of bactericidal ZnO-SnO2 nanocomposites prepared by polymer-salt method and the structure and morphology of prepared materials were studied by XRD and SEM analysis.
Abstract: This work describes the study of the synthesis and characterization of bactericidal ZnO-SnO2 nanocomposites prepared by polymer-salt method. The structure and morphology of prepared materials were studied by XRD and SEM analysis. Prepared ZnO-SnO2 nanocomposites demonstrate the ability to generate singlet oxygen under external irradiation and high antibacterial activity against both gram-positive (Staphylococcus aureus ATCC 209P) and gram-negative (Escherichia coli ATCC 25922) bacteria. Antibacterial effect increases significantly with the growth of SnO2 addition content up to 9–12 mol% content that is related to the decrease of ZnO nanocrystals sizes and the corresponding increase of materials specific surface areas.

Journal ArticleDOI
TL;DR: In this article, features of registration of a nuclear magnetic resonance (NMR) signal in a weak magnetic field from a small volume of a condensed medium (less than 0.2 mL) using a modulation technique were considered.
Abstract: We considered features of registration of a nuclear magnetic resonance (NMR) signal in a weak magnetic field from a small volume of a condensed medium (less than 0.2 mL) using a modulation technique. The relationships between the parameters of modulation field Hm and fm, generation field H1 of the autodyne detector, and the degree of inhomogeneity of magnetic field H0 for recording the NMR signal from the investigated medium with a signal-to-noise ratio of at least 1.3 are determined. To expand the functionality of the small-sized NMR spectrometer, a new design of the magnetic system was developed and implemented using step inserts made of soft magnetic material.

Proceedings ArticleDOI
30 Jun 2021
TL;DR: In this paper, a mathematical description of the procedures for individual and group adaptive signal processing is given, as well as formulas for calculating the optimal weight vector that provides the best approximation of the input signal to the desired signal.
Abstract: Tasks of adaptive algorithms synthesis in antenna arrays for the individual and group adaptive signal processing implementation to improve the quality of multiple signals reception in radio engineering systems are considered. A mathematical description of the procedures for individual and group adaptive signal processing is given, as well as formulas for calculating the optimal weight vector that provides the best approximation of the input signal to the desired signal. Approximate methods of optimal signal processing based on iterative algorithms in the form of Widrow gradient adaptation algorithms are considered. The modeling of gradient algorithms in the MATLAB environment has been carried out. Based on the simulation results, an analysis of the gradient algorithms sensitivity for changes in initial conditions, such as the convergence step of the algorithm, the number of antenna array elements, and SNR was carried out. The optimal values of the convergence step have been obtained based on the analysis of the algorithm's sensitivity and the convergence rate of the algorithms. In conclusion, an example of an antenna array radiation pattern, which provides adaptive signal processing, taking into account the optimal parameters of the system, is given.

Journal ArticleDOI
31 Mar 2021
TL;DR: The article demonstrates the concept of building a laboratory for penetration testing using a special program that is a set of scripts that configure the system in accordance with a userdefined script, forming scripts with elements of randomization.
Abstract: The article demonstrates the concept of building a laboratory for penetration testing using a special program. The program is a set of scripts that configure the system in accordance with a userdefined script. Thanks to the elements of script randomization, this solution allows you to deploy several educational tasks at once to a group of students using only one virtual machine image. The basic idea is that the setup and creation of a vulnerable target occurs just before the execution of the learning task itself. Those, the virtual machine is initially a basic Ubuntu Linux image that does not have any set of vulnerabilities. The main feature of the proposed solution is that the content of the scripts describes not one variant of the system configuration, but several at once, forming scripts with elements of randomization. In other words, having a basic Ubuntu Linux image and a set of the scripts, you can create different tasks for a dozen students. Keywords—information security, penetration testing, training laboratory, virtualization, CTF. Article info Article in Russian. Received 02.03.2021, accepted 24.03.2021. For citation: Shterenberg S., Moskalchuk A., Krasov A.: Develop security scripts to create vulnerable virtual machines and learn penetration testing techniques // Telecom IT. 2021. Vol. 9. Iss. 1. pp. 47–58 (in Russian). DOI 10.31854/2307-1303-2021-9-1-47-58. ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ Март 2021 Том 9 No 1 ISSN 2307-1303 http://ijitt.ru/ Штеренберг С. И., Москальчук А. И., Красов А. В. Разработка сценариев безопасности для создания уязвимых виртуальных машин... 49 Введение С каждым годом востребованность в проведении тестирования на проникновение заметно возрастает. Данная необходимость обусловлена тем, что современные компании сильно заинтересованы в поддерживании достойного уровня информационной безопасности (далее ИБ). Утечка критичных данных может за собой нести как существенные финансовые, так и репутационные риски. Однако, для построения наилучшей защиты, необходимо оценить её первоначальный уровень и отталкиваться от полученных результатов и возможных рисков. Одной из лучших общепринятых практик является как раз тестирование на проникновение, которое представляет собой симуляцию кибератаки на информационную инфраструктуру компании. Тестирование на проникновение может предоставить реалистичную оценку текущего уровня ИБ и продемонстрировать, какие потенциальные риски несет проникновение злоумышленника в информационную инфраструктуру [1, 2, 3]. В большинстве случаев тестирование на проникновение может являться как хорошим началом для построения безопасной инфраструктуры, так и для поддерживания уровня ИБ в дальнейшем. Данная проблема натолкнула на создание такого решения, благодаря которому студент или преподаватель может использовать один образ ВМ для развертывания сразу нескольких учебных задач, различных друг от друга. Это может позволить избежать процесса поиска и установки новых целей в имеющуюся учебную лабораторию и существенно сократить процент несамостоятельного выполнения работ. Важно отметить, что предлагаемое решение нацелено в первую очередь на студентов университетов, которые только начинают знакомство c методами тестирования на проникновение. Описание предлагаемого решения Основная идея заключается в том, что настройка и создание уязвимой цели происходит непосредственно перед выполнением самой учебной задачи. Т. е. изначально ВМ является базовым образом Ubuntu Linux, не обладающим какимлибо набором уязвимостей. Конфигурирование ВМ и создание учебной задачи осуществляется при помощи набора скриптов, которые заранее загружаются из внешнего источника [4]. Главной особенностью предлагаемого решения является то, что содержание скриптов описывает не один вариант конфигурации системы, а сразу несколько, образуя сценарии с элементами рандомизации. Иначе говоря, имея базовый образ Ubuntu Linux и набор вышеупомянутых скриптов, можно создать различные друг от друга задачи для десятка студентов. На рис. 1 (ниже) можно увидеть высокоуровневую модель, которая иллюстрирует пример разворачивания учебной лаборатории. Как видно из рис. 1, от пользователя требуется минимальное количество возможных действий от момента установки до перехода к практике [5]. На первом этапе необходимо иметь лишь средство виртуализации и образ ВМ Ubuntu Linux. Дальнейшим шагом является загрузка конфигурационных скриптов на целевой сервер. После этого можно инициализировать основной скрипт конфигурации и приступить к выполнению учебных задач.

Journal ArticleDOI
30 Jun 2021
TL;DR: The requirements for the initial input data, enabling the reliable results, are demonstrated and it is shown that equality of the coverage zones of both transmitter types is determined by the proper ratio of the transmitter's signal levels.
Abstract: This work considers the application of the Radio Mobile software for calculating the coverage zones of analogue FM- and digital DRM-transmitters. The requirements for the initial input data, enabling the reliable results, are demonstrated. It is shown that equality of the coverage zones of both transmitter types is determined by the proper ratio of the transmitter’s signal levels.

Proceedings ArticleDOI
30 Jun 2021
TL;DR: In this paper, the joint efficiency of spatiotemporal coding with two receiving and transmitting antennas, together with signal-code structures, is analyzed by modeling methods in the MATLAB environment.
Abstract: To increase the energy and spectral efficiency of radio engineering systems, it is advisable to combine the methods of space-time coding with the use of multi-element receiving and transmitting antennas in promising radio communication systems and signal-code structures. The joint efficiency of spatiotemporal coding with two receiving and transmitting antennas, together with signal-code structures, is analyzed by modeling methods in the MATLAB environment. Based on the results of the analysis, a reasonable joint choice of methods of multi-position modulation in combination with noise-resistant and space-time coding in radio engineering systems for various purposes is possible.

Journal ArticleDOI
24 Aug 2021-Sensors
TL;DR: In this paper, the authors considered a UAV-assisted cell in a single user scenario and considered the quality of experience (QoE) performance metric calculating it as a function of the packet loss ratio.
Abstract: In this work, we consider a UAV-assisted cell in a single user scenario. We consider the Quality of Experience (QoE) performance metric calculating it as a function of the packet loss ratio. In order to acquire this metric, a radio-channel emulation system was developed and tested under different conditions. The system consists of two independent blocks, separately emulating connections between the User Equipment (UE) and unmanned aerial vehicle (UAV) and between the UAV and Base station (BS). In order to estimate scenario usage constraints, an analytical model was developed. The results show that, in the described scenario, cell coverage can be enhanced with minimal impact on QoE.

Proceedings ArticleDOI
26 May 2021
TL;DR: In this article, a monitoring system for physical processes in objects of mineral resource complex (for example, coal deposits) is proposed, based on the results of the analysis of existing monitoring systems for coal deposits.
Abstract: The paper is devoted to the development of a monitoring system for physical processes in objects of mineral resource complex (for example, coal deposits). Based on the results of the analysis of existing monitoring systems for coal deposits, authors developed mathematical model of physical processes in coal deposits, as well as the system for monitoring of hazardous gas concentrations caused by physical processes in coal deposits. Authors identified adjustment coefficient for converting the ratio of sensor resistance to gas concentration. Authors designed full-scale model for carrying out research, developed a program for plotting graphs based on read parameters from sensors for convenient data presentation, developed a program for collecting and storing data from sensors in a file.

Journal ArticleDOI
01 Apr 2021
TL;DR: In this article, the tasks of computer simulation of moldboard's surface were considered and the geometric models of working surface elements developed based on research results were implemented in AutoCAD and SIMPLEX systems.
Abstract: There are considered the tasks of computer simulation of moldboard's surface in the article. The proposed solution is required in educational, research, and production processes. The researches were carried out using the constructive geometric modeling methods and systems. Objects of computer simulation were chosen the computer models of a directory curve, generative lines, and a frontal contour which are elements of the working surface. The geometric models of working surface elements developed based on research results were implemented in AutoCAD and SIMPLEX systems. The proposed simulation models can reduce the design period, simplify the geometric parameters' setting and facilitate the work of designers.

Journal ArticleDOI
01 Feb 2021
TL;DR: The article determination of promising areas of research in the development of communication networks in terms of their creation in sparsely populated and hard-to-reach areas and the prospects for their development Method.
Abstract: Research subject. The article is devoted to the analysis of the development of telecommunication networks in the Republic of Angola and the prospects for their development Method. System analysis. Core results. Determination of promising areas of research in the development of communication networks in terms of their creation in sparsely populated and hard-to-reach areas. Practical relevance. The results of the article can be used to modernize the telecommunication network of the Republic of Angola.

Journal ArticleDOI
TL;DR: In this article, a new design of nuclear magnetometer which uses maser with flowing liquid is proposed and the block diagram of the magnetometer is presented, and the principle of its operation is described in detail.
Abstract: The necessity to develop a magnetometer for variations research in the mid-field magnetic strength with a relative error of 10–6 is justified. A new design of nuclear magnetometer which uses maser with flowing liquid is proposed. The block diagram of the magnetometer is presented, and the principle of its operation is described in detail. Furthermore, the conditions of occurrence of maser generation are established. The measurement errors of magnetic field variations in the developed magnetometer design are calculated. The capabilities of the developed magnetometer are determined. Finally, the results of experimental investigations of various variations of magnetic fields are presented.

Proceedings ArticleDOI
16 Mar 2021
TL;DR: In this paper, the authors proposed a new proposal approach to intersection priority management under the gradual penetration of V2X technology, in which road users and roadside infrastructure can coordinate traffic effectively.
Abstract: One of the most difficult problems of today's transport system is the management of intersections in large cities. Standard methods and automated control systems based on them through traffic lights are efficient, but not able to cope with certain problems related to galloping mobility. However, modern advances in cooperative communication and navigation have made joint intersection management possible, in which road users and roadside infrastructure can coordinate traffic effectively. This paper proposes a new-proposal approach to intersection priority management under the gradual penetration of Vehicle-to-Everything (V2X) technology.

Journal ArticleDOI
TL;DR: In this paper, a model for describing the line shape of absorption and dispersion signals from which a recorded signal of nuclear magnetic resonance (NMR) is formed in a weak field is proposed.
Abstract: A model is proposed for describing the line shape of absorption and dispersion signals from which a recorded signal of nuclear magnetic resonance (NMR) is formed in a weak field. The expediency of using spectral analysis to determine the contributions of absorption and dispersion signals to the recorded NMR signal has been substantiated using a modulation technique. A new method is proposed for determining these contributions. The research results are presented.

Journal ArticleDOI
31 Mar 2021
TL;DR: Correct methods output signals of hydroacoustic transmission paths, periodic pulse sequence creation and parametric voltage level control of excitation channels of phased antenna grid with abrupt decrease impedance of Hydroacoustic converters are reviewed.
Abstract: Solving tasks of creation, correction and parametric control of signals excitation hydroacoustic phased antenna grids is actual problem of creating multichannel generated devices, based on switch-mode amplifiers with pulse-width modulation. In this article were reviewed correction methods output signals of hydroacoustic transmission paths, periodic pulse sequence creation and parametric voltage level control of excitation channels of phased antenna grid with abrupt decrease impedance of hydroacoustic converters. Was shown the perspective implementation digital technologies for improvement parameters modes of hydrolocation with deterministic library of signals. Presented digital control methods of output signals in hydroacoustic transmission paths are characterized by scientific novelty and originality of the proposed technical decisions.

Journal ArticleDOI
31 Mar 2021
TL;DR: In this paper, a method for determining the phase relationship of currents at the inputs of active phased antenna arrays (APAR) elements, taking into account its placement and functioning on a real object, is presented.
Abstract: When designing the antenna field of a stationary HF transmitting radiocenter, it is necessary to provide for reserving ground-based symmetrical antennas operating on round-the-clock radio directions with backup, fastdeployable antenna systems. As such antennas, it is proposed to use asymmetric vertical dipoles, active phased antenna arrays (APAA) based on them with a controlled directional pattern. This article considers methods for calculating such systems, a method is developed for determining the phase relationships of currents at the inputs of APAR elements, taking into account its placement and functioning on a real object. The results of route tests of single antennas and APAA on a radio link with a length of 650 km are presented.

Proceedings ArticleDOI
26 May 2021
TL;DR: In this paper, the authors discuss the issue of using neural network control in cooling systems and propose a neural network-based approach to provide a wide range of operating conditions and ensure reliable cooling.
Abstract: Nowadays, technical equipment is becoming more complex, and powerful equipment is used to control them, which increases the heat generation. The most important tasks of a stable cooling system are to provide a wide range of operating conditions and to ensure reliable cooling. The paper discusses the issue of using neural network control in such systems.

Proceedings ArticleDOI
26 Jan 2021
TL;DR: In this paper, the main features in the implementation of a Multichannel Continuous Wavelet Transform (MCWT) on the Nvidia Jetson Single Board Computers (SBCs) using a General-Purpose Graphical Processing Unit (GPGPU).
Abstract: This article describes the main features in the implementation of a Multichannel Continuous Wavelet Transform (MCWT) on the Nvidia Jetson Single Board Computers (SBCs) using a General-Purpose Graphical Processing Unit (GPGPU). Two MCWT implementations are considered. The first implementation of an algorithm computes CWT in time-domain using convolution. The second implementation computes CWT in frequency-domain using Fast Fourier Transform (FFT). Algorithms implemented in C++ programming language using CUDA framework. Both methods are compared with each other on different hardware with various configurations. For GPGPU hardware SBCs Nvidia Jetson Nano and Nvidia Jetson TX2 were used. Also, SBCs Raspberry Pi 2 and Pi 3 were used for comparison with GPGPUs. Implemented MCWT intended to operate in real-time for biomedical signal processing.