Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017)

Session: SMART TECHNOLOGIES: E-GOVERNANCE, NETWORKS, CYBERPHYSICAL SYSTEMS

13 articles
Proceedings Article

Method of radio communication based on non-deterministic radio signals

Anton Ubaichin, Gregory Zhuk
The paper describes a method to make a noise-immune radio communication system with high emission security. The noise-immunity and emission security of information transmitting are provided through the use of non-deterministic radio signals (white Gaussian noise). The block diagrams of the receiver and...
Proceedings Article

Fluctuation sensitivity models of microwave radiometers

Tilekbek Abdirasul, Egor Alekseev, Dmitry Minenko, Anton Ubaichin, Gregory Zhuk
This paper offers a comparative analysis of the fluctuation sensitivity of radiometers of different types. We have considered mathematical models of fluctuation sensitivity , taking into account the destabilizing factors. Practical recommendations on the approaches to increasing the fluctuation sensitivity...
Proceedings Article

Integrated Assessment ofÿQuality ofÿService ofÿWireless Networks Deployed InÿTomsk

Dmitriy Shmakov
This paper presents the integrated assessment of quality of service of GSM 900/1800, UMTS and LTE mobile networks deployed in Tomsk and the analysis of their coverage quality. It also presents the results of the measurements of key quality indicators for the mobile telecommunications operators and conclusions...
Proceedings Article

The Model of Device Community Forming Problem for the Geographically-Distributed Information and Control Systems Using Fog-computing Concept

Eduard Melnik, Anna Klimenko, Donat Ivanov
This paper focuses on the fog-computing concept usage in the geographically-distributed information and control systems. Fog-computing concept improves the dependability of the information and control system, system latency and the communicational environment load. The key issue of fog-computing application...
Proceedings Article

Combined Optimization and Modified Performance Metrics for Automated Model and Parameter Selection in Telecom Customer Churn Prediction

Stanislav Alkhasov, Alexey Tselykh
- In this paper, we consider the construction of an optimization algorithm designed to identify, in automatic way, the optimal parameters and algorithms for binary classification in the task of customer churn prediction in telecommunication. The currently supported methods for classification include...
Proceedings Article

Network traffic clustering for intrusion detection

Arina Nikishova, Irina Ananina, Evgeny Ananin
The problem of network attacks detecting is considered. It is proposed to use clustering of network packets for anomaly detection in network traffic. Anomalies may indicate the implementation of network attacks. The used clustering algorithm is k-means method. It has a number of parameters, the choice...
Proceedings Article

Evaluation of polling systems influence on quality of service in wireless computer networks

Igor Kalinin, Liudmila Muravieva-Vitkovskaya
Polling systems in wireless computer networks review is provided. Classifications are offered for queuing system types, queuing disciplines, and application service disciplines. The results of a comparative analysis of various polling systems on mathematical models and recommendations for their application...
Proceedings Article

Applied Infocommunication Systems And Their Models

Alexander Sotnikov, Gallia Katasonova
Methods for formal description of informational interaction in complex info-communicational systems and its models are investigated. Main notions and terms are defined. Complex of multilevel models for applied info-communicational systems for telemedicine are proposed
Proceedings Article

Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN

Sergey Iskhakov, Roman Meshcheryakov, Anastasia Iskhakova, Sergey Bondarchuk
The increasing number of automated systems using the global network for management has led to the need to search for new technologies for transmitting data from various sensors over long distances with minimal energy consumption. Today, there are several similar technologies on the market that claim...
Proceedings Article

Clustering helps to determine the changes in telecom subscribers' behavior

Alexey Golubev, Ngyuen Anh Tuan, Maxim Shcherbakov, Tran Van Phu
Telecom company tries to find out new ways for developing new personal-oriented services based on data analysis. Changes in telecom users behavior are the objects of investigation. If a user changes its service usage, the company should pay attention to the fact and minimize the negative outcomes (e.g....
Proceedings Article

Intercomplex exchange alternatives in duplicated computing complex clusters

Stanislav Turbin, Vladimir Bogatyrev
Increased reliability of distributed systems can be achieved as a result of redundancy nodes implemented as duplicated computer complexes, which combined into clusters, and the efficiency of these clusters is largely depended on the intra and intercomplex data exchange organization. The options of intercomplex...
Proceedings Article

Analysis of the vulnerabilities of the embedded information systems of IoT-devices through the honeypot network implementation

Anastasia Iskhakova, Roman Meshcheryakov, Andrey Iskhakov, Sergey Timchenko
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects...
Proceedings Article

Increase in security of authentication services through additional identification using optimal feature space

Andrey Iskhakov, Roman Meshcheryakov, Sergey Iskhakov, Alexey Krainov
The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification...