telecommunication networks
Recently Published Documents


TOTAL DOCUMENTS

1250
(FIVE YEARS 326)

H-INDEX

30
(FIVE YEARS 5)

2022 ◽  
Vol 2022 ◽  
pp. 1-8
Author(s):  
J. Divakaran ◽  
S. K. Prashanth ◽  
Gouse Baig Mohammad ◽  
Dr Shitharth ◽  
Sachi Nandan Mohanty ◽  
...  

Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.


Author(s):  
M. Bouziani ◽  
H. Mouatassim ◽  
K. Fadl ◽  
H. Nouari

Abstract. Land subdivision represents a complex procedure which leads to the construction of a set of buildings and utilities necessary for the viability of the project: Roads, sewerage network, water network, electricity network and telecommunication networks. The techniques adopted so far to carry out land subdivision projects in Morocco have certain limitations. Several stakeholders are necessary for the realization of a land subdivision and many 2D plans and documents are used. These plans and documents are independently produced and carried out by the various trades involved in the project. If a change is made to one element of the project, which often happens, several documents and plans are affected and must be updated. This can be a source of errors and conflicts and can lead to an increase in the time and cost of the hall project. This study proposes the development of a Building Information Modelling (BIM) infrastructure workflow adapted to land subdivision projects in Morocco. The integration of BIM in this type of project is an innovation in the Moroccan context. It will improve the design, simplify communication and collaboration between the various stakeholders and facilitate the management and the monitoring of the project. The resulting digital BIM model can be used to produce 2D and 3D construction plans, take measurements and plan work. It constitutes the basic platform to perform calculations and simulations at any stage of the infrastructure life cycle and to detect and resolve interferences in a collaborative environment.


2021 ◽  
Vol 27 (4) ◽  
pp. 186-191
Author(s):  
Valeria A. Demidovich

The purpose of this article is to analyse the existing legal regulation of acts that are part of the crime under Art. 135 of the Criminal Code of the Russian Federation, in the criminal legislation of foreign countries. This analysis is aimed at improving Russian legislation in terms of counteracting the commission of these crimes. The author outlines the problem of qualifying lecherous actions both in Russian and foreign legislation. The category of “lecherous acts” in the understanding of Russian legislation and its correlation with similar acts in foreign countries has been investigated. The legislative and practical experience of England, Spain and France in this area is analysed, the advantages and disadvantages of the legal regulation of lecherous actions are highlighted. Positive experience is presented as proposals for optimising Russian legislation providing for liability for lecherous acts, it is proposed to give a legal assessment of the acts provided for Art. 135 of the Criminal Code of the Russian Federation, committed with the use of telecommunication networks by persons who are legal representatives of minors, as well as persons whose job responsibilities include providing care, upbringing and rendering educational services, since the commission of a crime under Art. 135 of the Criminal Code of the Russian Federation in these conditions is a greater public danger.


Author(s):  
Valery Romaniuk ◽  
Olexandr Lysenko ◽  
Valery Novikov ◽  
Ihor Sushyn

Background. The article presents the results of a study of methods of positioning, localization and data collection from nodes of a mobile wireless sensor network using intelligent adaptive telecommunication air platforms. To implement the study of this research topic, an analysis of literary sources on this topic was carried out. Based on a fairly rich bibliographic material, this work has the main task of examining, analyzing and systematizing already known approaches to positioning objects in wireless sensor networks using intelligent adaptive telecommunication air platforms and suggesting options for their development. Objective. The aim of the work is to improve the methods of direct data collection of TA from the nodes of BSM, the general directions of synthesis of which are defined in the work. Methods. Methods of cluster analysis (network clustering), graph theory (research of analytical models of BSM with TA functioning, construction of cluster topology), theory of telecommunication networks (when calculating bandwidth in BSM with TA radio channels) and theory were used to solve the formulated problem. (when developing a positioning model for telecommunications air platforms) Results. A technique for evaluating the effectiveness of methods for collecting data from wireless sensor networks using intelligent adaptive telecommunication air platforms is proposed. Conclusions. The method of collecting TA monitoring data from the main nodes of clustered BSM has been improved. The method of estimation of efficiency of methods of data collection with BSM by telecommunication air platforms is offered.


Author(s):  
Aleksandr Batenkov ◽  
Kirill Batenkov ◽  
Aleksandr Fokin

Introduction: For large and structurally complex telecommunication networks, calculating the connectivity probability turns out to be a very cumbersome and time-consuming process due to the huge number of elements in the resulting expression. The most expedient way out of this situation is a method based on the representation of a network connectivity event in the form of sums of products of incompatible events. However, this method also requires performing additional operations on sets in some cases. Purpose: To eliminate the main disadvantages of the method using multi-variable inversion. Results: It is shown that the connectivity event of a graph should be interpreted as a union of connectivity events of all its subgraphs, which leads to the validity of the expression for the connectivity event of the network in the form of a union of connectivity events of typical subgraphs (path, backbone, and in general, a multi-pole tree) of the original random graph. An iterative procedure is proposed for bringing a given number of connectivity events to the union of independent events by sequentially adding subgraph disjoint events. The possibility of eliminating repetitive routine procedures inherent in methods using multi-variable inversion is proved by considering not the union of connectivity events (incoherence) degenerating into the sum of incompatible products, but the intersection of opposite events, which also leads to a similar sum. However, to obtain this sum, there is no need to perform a multi-variable inversion for each of the terms over all those previously analyzed. Practical relevance: The obtained analytical relations can be applied in the analysis of reliability, survivability or stability of complex telecommunications networks.


2021 ◽  
Vol 25 (2) ◽  
pp. 541-561
Author(s):  
Natalia V. Buzova

The development of technologies contributes to the emergence of new intangible objects that have potential value and are aimed at spreading the results of creativity and information. In this regard, the society is interested in encouraging the activities of entities that create such objects. One of the options for the protection of such objects is to grant the related rights. Considering the technological changes in society associated with the use of information and telecommunication networks and artificial intelligence, the issues of granting related rights to new entities gain relevance. In order to identify the possibility of expanding the institution of related rights and determine the directions of such expansion, the article analyzes the main approaches to the formation of the institute of related rights, their characteristics, and attempts to deliver a working definition of the concept of related rights. On the basis of a comparative analysis, the author considers Russian and foreign legislative acts in the field of intellectual property, international treaties on copyright and related rights, as well as legal literature. The most supported idea of the formation of the institute of related rights is the functional purpose of the activities of subjects of related rights, acting as intermediaries between authors and representatives of the public. However, the institute itself is evolving and recognition of related rights for new subjects depends not only on the functional purpose of the activity, but also on their organizational and/or economic contribution aimed at processing and disseminating works and information. It can be assumed that the institute of related rights will continue to expand with the development of technologies and the public demand for new services provided by new technologies.


2021 ◽  
Vol 27 (12) ◽  
pp. 634-641
Author(s):  
V. N. Tarasov ◽  
◽  
N. F. Bakhareva ◽  

In the mathematical modeling of modern computer networks, telecommunication networks, traffic flows, logistics and many others, the methods of queuing theory are widely used. In turn, in studies of queuing systems (QS) G/G/1 with arbitrary distribution laws of intervals between adjacent requirements of the incoming flow and their service time, the spectral decomposition method (MSD) of solving the Lindley integral equation is often used. This method is based on the search for zeros and poles of the constructed spectral decomposition in the form of some fractional-rational function using numerical methods to determine the roots of polynomials. In this case, the coefficients of the polynomial in the numerator of the expansion are expressed through the unknown parameters of the distribution laws used to describe the QS. In the case of teletraffic research, usually these unknown parameters of the distribution laws can be determined through the numerical characteristics of the intervals between traffic packets by the method of moments. The purpose of this article is to present a fundamentally new mathematical model of a system formed by two flows with distribution laws shifted to the right. This is possible only for those probability distribution laws whose density functions are Laplace transformable. The main advantages of such systems, let us call them time lag systems, are that they provide less queue latency compared to conventional systems, and that they extend the range of traffic parameters. The article presents the results obtained on the average delay of requests in the queue for a system with exponential and hyper-Erlang distributions, an algorithm for calculating the average delay and the results of computational experiments in the Mathcad package.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
J. Cariñe ◽  
M. N. Asan-Srain ◽  
G. Lima ◽  
S. P. Walborn

AbstractFourth-order interference is an information processing primitive for photonic quantum technologies, as it forms the basis of photonic controlled-logic gates, entangling measurements, and can be used to produce quantum correlations. Here, using classical weak coherent states as inputs, we study fourth-order interference in 4 × 4 multi-port beam splitters built within multi-core optical fibers, and show that quantum correlations, in the form of geometric quantum discord, can be controlled and maximized by adjusting the intensity ratio between the two inputs. Though these states are separable, they maximize the geometric discord in some instances, and can be a resource for protocols such as remote state preparation. This should contribute to the exploitation of quantum correlations in future telecommunication networks, in particular in those that exploit spatially structured fibers.


2021 ◽  
pp. 026666692110476
Author(s):  
Mary Magdaline Enow Mbi Tarkang ◽  
Ruth N Yunji ◽  
Simplice Asongu ◽  
Uju Violet Alola

The mobile telecommunication (telecom) sector has become the basic source of information nowadays, especially in Cameroon. It is used to transfer and deliver information through voice, video, data, graphics, and more at perpetually increasing speeds. The quality of mobile services does not only impact the attraction of new customers but also to maintain the existing ones. The study uses relationship marketing theory and a quantitative and cross-sectional method with 200 respondents. Information was obtained from users of MTN and Orange mobile telecommunication networks. The analyses were done using SPSS version 20. Tangibility, reliability, and assurance dimensions of staff service quality showed a positive relationship with customer loyalty in mobile telecom companies in Cameroon. The findings also highlight the influence of service quality dimensions on customer loyalty in the mobile telecom companies of the country.


Sign in / Sign up

Export Citation Format

Share Document