RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Mathematical Models of the Information Interaction Process in 5G-IoT Ecosystem: Different Functional Scenarios

        Viacheslav Kovtun,Ivan Izonin,Michal Gregus 한국통신학회 2023 ICT Express Vol.9 No.2

        This paper proposes mathematical models of the process of information interaction between a set of subjects (IoT devices) and a base station in the 5G-IoT ecosystem. The researched process, in this case, is represented by a queuing system with a flow of new incoming requests with needs for the desired volumes of system resources and a flow of service signals, the receipt of which initiates redefinition of allocated for received incoming requests volumes of system resources. A controlled parameter in the created queuing system is the acceptance or rejection of new incoming requests. The priority is to support active sessions of subject-system interaction initiated for the received incoming requests. We consider two functional scenarios, which differ asynchronously or synchronously when a service signal comes to the base station’s front-end interface. The receipt marks a partial or complete redefinition of system resources involved in supporting active sessions of subject-system interaction. Formalized in the basis of a single queuing system, mathematical models of development of these functional scenarios allow calculating the probability of rejection of a new incoming request and the percentage of occupied system resources, combined in the metrics of quality indicators, in the conditions of asynchronous or synchronous change of the spatial location relative to the base station of the end IoT devices, the received input requests from which are active in the 5G-IoT ecosystem.

      • KCI등재

        Crypto coding system based on the turbo codes with secret keys

        Kovtun Viacheslav,Ivanov Yuriy 한국통신학회 2024 ICT Express Vol.10 No.2

        In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.

      • KCI등재

        Modeling of Operation of Information System for Critical Use in the Conditions of Influence of a Complex Certain Negative Factor

        Oleg Bisikalo,Oksana Danylchuk,Viacheslav Kovtun,Olena Nikitenko,Oksana Kovtun,Victoria Vysotska 제어·로봇·시스템학회 2022 International Journal of Control, Automation, and Vol.20 No.6

        The development of the infosphere is accompanied by a proportional increase in the amount of personalized information and the threats of unauthorized access to it. This confrontation is especially acute when it comes to the resources of information systems for critical use (ISCU), unauthorized access to which can cause significant material or human losses. The specificity of ISCU determines the only rational way of evolution of means of ensuring their dependability – the mathematical modeling of the process of operation of the studied systems under the influence of certain negative factors. When determining a certain negative factor, the authors rely on the hierarchical classification of modern cyber threats presented in the specialized database of the Open Web Application Security Project (OWASP). The article presents an improved Markov mathematical model of operation of ISCU in the conditions of aggressive cyberphysical space in which, in contrast to the existing ones, the process of confrontation of the information protection subsystem of the studied system and the complex certain negative factor is analytically formalized. The proposed model takes into account that the interdependent components of the complex negative factor were created by cyber-attackers with a focus on invulnerability to individual protection schemes. The authors consider a complex negative factor as an ordered interconnected sequence of certain negative factors. An applied result of mathematical modeling is analytical equations in the first approximation to calculate the time to failure of the studied system, which operates under the influence of complex negative factor, and stochastic description of the allowable states in which the studied system may be at any discrete time.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼