Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017)
Session: SMART TECHNOLOGIES: E-GOVERNANCE, NETWORKS, CYBERPHYSICAL SYSTEMS
13 articles
Proceedings Article
Method of radio communication based on non-deterministic radio signals
Anton Ubaichin, Gregory Zhuk
The paper describes a method to make a noise-immune radio communication system with high emission security. The noise-immunity and emission security of information transmitting are provided through the use of non-deterministic radio signals (white Gaussian noise). The block diagrams of the receiver and...
Proceedings Article
Fluctuation sensitivity models of microwave radiometers
Tilekbek Abdirasul, Egor Alekseev, Dmitry Minenko, Anton Ubaichin, Gregory Zhuk
This paper offers a comparative analysis of the fluctuation sensitivity of radiometers of different types. We have considered mathematical models of fluctuation sensitivity , taking into account the destabilizing factors. Practical recommendations on the approaches to increasing the fluctuation sensitivity...
Proceedings Article
Integrated Assessment ofÿQuality ofÿService ofÿWireless Networks Deployed InÿTomsk
Dmitriy Shmakov
This paper presents the integrated assessment of quality of service of GSM 900/1800, UMTS and LTE mobile networks deployed in Tomsk and the analysis of their coverage quality. It also presents the results of the measurements of key quality indicators for the mobile telecommunications operators and conclusions...
Proceedings Article
The Model of Device Community Forming Problem for the Geographically-Distributed Information and Control Systems Using Fog-computing Concept
Eduard Melnik, Anna Klimenko, Donat Ivanov
This paper focuses on the fog-computing concept usage in the geographically-distributed information and control systems. Fog-computing concept improves the dependability of the information and control system, system latency and the communicational environment load. The key issue of fog-computing application...
Proceedings Article
Combined Optimization and Modified Performance Metrics for Automated Model and Parameter Selection in Telecom Customer Churn Prediction
Stanislav Alkhasov, Alexey Tselykh
- In this paper, we consider the construction of an optimization algorithm designed to identify, in automatic way, the optimal parameters and algorithms for binary classification in the task of customer churn prediction in telecommunication. The currently supported methods for classification include...
Proceedings Article
Network traffic clustering for intrusion detection
Arina Nikishova, Irina Ananina, Evgeny Ananin
The problem of network attacks detecting is considered. It is proposed to use clustering of network packets for anomaly detection in network traffic. Anomalies may indicate the implementation of network attacks. The used clustering algorithm is k-means method. It has a number of parameters, the choice...
Proceedings Article
Evaluation of polling systems influence on quality of service in wireless computer networks
Igor Kalinin, Liudmila Muravieva-Vitkovskaya
Polling systems in wireless computer networks review is provided. Classifications are offered for queuing system types, queuing disciplines, and application service disciplines. The results of a comparative analysis of various polling systems on mathematical models and recommendations for their application...
Proceedings Article
Applied Infocommunication Systems And Their Models
Alexander Sotnikov, Gallia Katasonova
Methods for formal description of informational interaction in complex info-communicational systems and its models are investigated. Main notions and terms are defined. Complex of multilevel models for applied info-communicational systems for telemedicine are proposed
Proceedings Article
Analysis of vulnerabilities in low-power wide-area networks by example of the LoRaWAN
Sergey Iskhakov, Roman Meshcheryakov, Anastasia Iskhakova, Sergey Bondarchuk
The increasing number of automated systems using the global network for management has led to the need to search for new technologies for transmitting data from various sensors over long distances with minimal energy consumption. Today, there are several similar technologies on the market that claim...
Proceedings Article
Clustering helps to determine the changes in telecom subscribers' behavior
Alexey Golubev, Ngyuen Anh Tuan, Maxim Shcherbakov, Tran Van Phu
Telecom company tries to find out new ways for developing new personal-oriented services based on data analysis. Changes in telecom users behavior are the objects of investigation. If a user changes its service usage, the company should pay attention to the fact and minimize the negative outcomes (e.g....
Proceedings Article
Intercomplex exchange alternatives in duplicated computing complex clusters
Stanislav Turbin, Vladimir Bogatyrev
Increased reliability of distributed systems can be achieved as a result of redundancy nodes implemented as duplicated computer complexes, which combined into clusters, and the efficiency of these clusters is largely depended on the intra and intercomplex data exchange organization. The options of intercomplex...
Proceedings Article
Analysis of the vulnerabilities of the embedded information systems of IoT-devices through the honeypot network implementation
Anastasia Iskhakova, Roman Meshcheryakov, Andrey Iskhakov, Sergey Timchenko
The Internet of Things is now an essential tool in many areas of human life. Researches related to the security of IoT-devices and IoT-networks are extremely relevant over the past ten years. The violation of the confidentiality, integrity of the transmitted data and the availability of smart objects...
Proceedings Article
Increase in security of authentication services through additional identification using optimal feature space
Andrey Iskhakov, Roman Meshcheryakov, Sergey Iskhakov, Alexey Krainov
The research focuses on topical issue of the Internet security. In particular, the issue of level increase in security of authentication services through additional identification using optimal feature space is being considered. This article is devoted to the practical application of additional identification...