scholarly journals ANALYSIS OF APPROACHES OF IMPACT OF ELECTRONIC WARFARE MEANS ON THE NETWORK–CENTRIC CONTROL SYSTEM

Author(s):  
O. Yula ◽  
O. Bidnyi ◽  
A. Vakula ◽  
O. Petrov ◽  
O. Kravchuk

The intensive development of information and control technologies, as well as their integration into a single information space, leads to an increase in the role of such technologies in the processes of control of troops (forces) and weapons, including high-precision ones. At the same time, the electronic material base of the information infrastructure created within the concept of network-centric warfare is potentially vulnerable to electronic warfare. In this article, the authors analyze the approaches to the impact of electronic warfare on network-centric control systems. In the course of the study, the authors solved the following interrelated tasks: identified information restrictions on the implementation of the network-centric war concept; the prospects for the development of electronic warfare systems that are focused on disruption of the operation of network-centric systems of military control and the prospective scientific and methodological approaches to substantiate the methods of radio-electronic impact on network-centric control systems. In the course of this research, the authors used the basic principles of electronic warfare theory, signal theory, communication theory, queuing systems and classical methods of scientific cognition – analysis and synthesis. According to the results of the study, the following conclusions can be drawn: perspective directions for the development of radio-electronic impact, oriented on the transport layer of communication networks, can be implemented as complexes of territorially distributed means of electronic control, implementing fundamentally new methods of suppression, and special software and bookmarks software (viruses) that are introduced into the telecommunications network equipment. It should be noted that the use of all the above radio-electronic effects is advisable only against packet networks with advanced topology. The use of such impacts against networks with tree topology is pointless since there is a possibility of attaining the suppression effect by“classical” channel suppression.

Author(s):  
A. Shyshatskyi ◽  
O. Sova ◽  
Yu. Zhuravskyi ◽  
O. Nalapko ◽  
Yu. Sokil ◽  
...  

The intensive development of information and control technologies, as well as their integration into a single information space, leads to an increase in the role of such technologies in the processes of control of troops (forces) and weapons, including high-precision ones. At the same time, the electronic material base of the information infrastructure created within the concept of network-centric warfare is potentially vulnerable to electronic warfare. In this article, the authors analyze the approaches to the influence of electronic warfare on network-centric control systems. In the course of the study, the authors solved the following interrelated tasks: identified information restrictions on the implementation of the network-centric war concept; the prospects for the development of electronic warfare systems that are focused on disruption of the operation of network-centric systems of military control and the prospective scientific and methodological approaches to substantiate the methods of radio-electronic influence on network-centric control systems. In the course of this research, the authors used the basic principles of electronic warfare theory, signal theory, communication theory, queuing systems and classical methods of scientific cognition - analysis and synthesis. According to the results of the study, the following conclusions can be drawn: perspective directions for the development of radio-electronic influences, oriented on the transport layer of communication networks, can be implemented as complexes of territorially distributed means of electronic control, implementing fundamentally new methods of suppression, and special software and bookmarks software (viruses) that are introduced into the telecommunications network equipment. It should be noted that the use of all the above radio-electronic effects is advisable only against packet networks with advanced topology. The use of such influences against networks with tree topology is pointless given the possibility of attaining the suppression effect of “classical” channel suppression


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1387
Author(s):  
Oswaldo Sebastian Peñaherrera-Pulla ◽  
Carlos Baena ◽  
Sergio Fortes ◽  
Eduardo Baena ◽  
Raquel Barco

Cloud Gaming is a cutting-edge paradigm in the video game provision where the graphics rendering and logic are computed in the cloud. This allows a user’s thin client systems with much more limited capabilities to offer a comparable experience with traditional local and online gaming but using reduced hardware requirements. In contrast, this approach stresses the communication networks between the client and the cloud. In this context, it is necessary to know how to configure the network in order to provide service with the best quality. To that end, the present work defines a novel framework for Cloud Gaming performance evaluation. This system is implemented in a real testbed and evaluates the Cloud Gaming approach for different transport networks (Ethernet, WiFi, and LTE (Long Term Evolution)) and scenarios, automating the acquisition of the gaming metrics. From this, the impact on the overall gaming experience is analyzed identifying the main parameters involved in its performance. Hence, the future lines for Cloud Gaming QoE-based (Quality of Experience) optimization are established, this way being of configuration, a trendy paradigm in the new-generation networks, such as 4G and 5G (Fourth and Fifth Generation of Mobile Networks).


Materials ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2191
Author(s):  
Xiaolan Wang ◽  
Xiaoping Zou ◽  
Jialin Zhu ◽  
Chunqian Zhang ◽  
Jin Cheng ◽  
...  

It is crucial to find a good material as a hole transport layer (HTL) to improve the performance of perovskite solar cells (PSCs), devices with an inverted structure. Polyethylene dioxythiophene-poly (styrene sulfonate) (PEDOT:PSS) and inorganic nickel oxide (NiOx) have become hotspots in the study of hole transport materials in PSCs on account of their excellent properties. In our research, NiOx and PEDOT: PSS, two kinds of hole transport materials, were prepared and compared to study the impact of the bottom layer on the light absorption and morphology of perovskite layer. By the way, some experimental parameters are simulated by wx Analysis of Microelectronic and Photonic Structures (wxAMPS). In addition, thin interfacial layers with deep capture levels and high capture cross sections were inserted to simulate the degradation of the interface between light absorption layer and PEDOT:PSS. This work realizes the combination of experiment and simulation. Exploring the mechanism of the influence of functional layer parameters plays a vital part in the performance of devices by establishing the system design. It can be found that the perovskite film growing on NiOx has a stronger light absorption capacity, which makes the best open-circuit voltage of 0.98 V, short-circuit current density of 24.55 mA/cm2, and power conversion efficiency of 20.01%.


Photonics ◽  
2021 ◽  
Vol 8 (4) ◽  
pp. 108
Author(s):  
Dong Qin ◽  
Yuhao Wang ◽  
Tianqing Zhou

This paper investigates the impact of cooperative spectrum sharing policy on the performance of hybrid radio frequency and free space optical wireless communication networks, where primary users and secondary users develop a band of the same spectrum resource. The radio frequency links obey Nakagami-m distribution with arbitrary fading parameter m, while the free space optical link follows gamma-gamma distributed atmospheric turbulence with nonzero pointing error. Because the secondary users access the spectrum band without payment, their behavior needs to be restricted. Specifically, the power of the secondary users is dominated by the tolerable threshold of the primary users. Considering both heterodyne and intensity modulation/direct detection strategies in optical receiver, the performance of optical relaying networks is completely different from that of traditional networks. With the help of bivariable Fox’s H function, new expressions for cumulative distribution function of equivalent signal to noise ratio at destination, probability density function, outage probability, ergodic capacity and symbol error probability are built in closed forms.


2021 ◽  
pp. 481-493
Author(s):  
Sarika Singh ◽  
Gargi Phadke

For any system to secure them industrial control system plays an important role in it. It helps to design the isolated procure system, specialized communication mechanisms is used to help for the setup. And with the help of this setup the flexibility, safety, threats, and vulnerabilities are the most important things to make. To secure them from risk assessment and other protection measurement need to specify with good instruments and security. The paper describes technical aspects on Denial of Service (Dos) attack. We also identify how smart grid communication networks works in security technical implementation guides of the different countries as a defense information systems agency. A brief chronicle of cyber storm on ICS; common challenges, some mitigation of those challenge, all levels of the multi-layered ICS architecture. This paper demonstrates railway control systems (RCS) compliance estimation of immovable control system design, operational scenarios that can be used for mitigation measures and security assessment.


2021 ◽  
Vol 100 (9) ◽  
pp. 929-932
Author(s):  
Anna M. Egorova ◽  
Lydiya A. Lutsenko ◽  
Anna V. Sukhova ◽  
Vyacheslav V. Kolyuka ◽  
Rustam V. Turdyev

The program “Digital Economy of the Russian Federation” approved the Concept for the creation and development of 5G / IMT-2020 networks. The development of 5G communications will significantly impact the implementation of many innovative projects and initiatives: the Smart City project, Unmanned Transport, etc. Along with significant technical advantages compared to previous generations of communication (2G, 3G, 4G), 5G technology has completely different emitting characteristics: more emitting elements, signal modulation, three-dimensional beam, the ability to control the beam, SHF (ultra-high) and EHF (extremely high) radio frequency ranges and centimetre and millimetre wavelengths of electromagnetic radiation. Therefore, it is becoming an especially urgent problem to ensure exposure to the human body of non-ionizing electromagnetic fields of the radio frequency range (30 kHz-300 GHz). The authors searched the literature on the biological effects of 5G cellular communications and electromagnetic radiation in the centimetre and millimetre ranges using the appropriate keywords in PubMed search engines, Scopus, Web of Science, Medline, The Cochrane Library, EMBASE, Global Health, CyberLeninka, RSCI and others. There is currently tentative and conflicting evidence on the impact of 5G. The rapidly growing density of wireless devices and antennas (considering future 5G networks) increases the public health risk from exposure to RF EMFs as the penetration depth for 5G EHF radiation is only a few millimetres. At these wavelengths, resonance phenomena are possible at the cellular and molecular levels, particularly concerning stimulating SHF and EHF oxidative processes and damaging DNA. The influence of the millimetre range of RF-EMF is poorly understood; oncological and non-oncological (impact on the reproductive, immune systems, etc.) effects are possible. Using numerical simulation methods of EMF radiation resonances on insects, Thielens A et al., 2018, found a significant overall increase in the absorbed RF power at a frequency of 6 GHz and higher than a frequency below 6 GHz.


Sign in / Sign up

Export Citation Format

Share Document