communication lines
Recently Published Documents


TOTAL DOCUMENTS

339
(FIVE YEARS 127)

H-INDEX

11
(FIVE YEARS 2)

2021 ◽  
Vol 80 (6) ◽  
pp. 366-373
Author(s):  
A. B. Kosarev ◽  
O. N. Rimskaya ◽  
I. V. Anokhov ◽  
I. V. Sirotenko

Development of the railway industry depends on the work of many engineers and scientists who master the advanced technical and technological frontiers. The results of their work require experimental verification by specialists, technicians and engineers in the field. At the same time, in a systematic setting of the case, the conduct of experiments should be preceded by discussion and scientific discussion. A scientific and technical journal is intended to serve as an absentee format for such a discussion.In 2022, our magazine will celebrate its 80th anniversary. It was created by the order of the Political Administration of the People's Commissariat of Railways of the USSR in 1942, in the midst of the Great Patriotic War. The state entrusted our journal with a very important mission — concentration and dissemination of experience in the restoration of damaged communication lines and development of new technologies for military freight and passenger railway transportation. This extreme practical orientation and an urgent need for empirical knowledge was reflected in the choice of the original name of the journal — “Railways engineering”.Since the creation of the journal, the editorial staff have striven to fulfll the mission entrusted to it and to maintain a high level of domestic railway science. Several stages can be distinguished in the eighty-year history of the VNIIZHT scientifc journal.This article presents an analysis of the frst stage — the stage of the war years.


2021 ◽  
Vol 4 (4) ◽  
pp. 377-385
Author(s):  
Volodymyr M. Lucenko ◽  
Dmytro O. Progonov

Reliable protection of confidential data processed in critical information infrastructure elements of public institutions and private organizations is topical task today. Of particular interest are methods to prevent the leakage of confidential data by localizing informative (dangerous) signals that both carry an informative component, and have a signal level higher than predefined threshold. The increase in signal energy from personal computers is caused by increasing of its transistors switching speed. Modern passive shielding methods for secured computers, similar to the well-known program TEMPEST, require either costly and large shielding units or technological simplification by using of low-cost fragmentary shielding of computer’s individual elements. Therefore, localization of side electromagnetic radiation produced by personal computer is needed. The paper presents a cost-effective approach to reducing the level of computer’s electromagnetic radiation by passive method. The radiation are localized and measured by its estimation on personal computer’s elements, namely unshielded communication lines between video processor and a monitor, fragments of electric tracks on motherboards, etc. During experiments authors used ad-hoc miniature electric (ball antenna) and magnetic (Hall sensor) antennas connected to selective voltmeters. This approach significantly reduces the cost of equipment and measurements as well as requirements to analytics’ qualification for improving computer’s protection. Also, the alternative approach for computer protection is proposed. The approach is based on image content protection by distorting the image on the monitor instead of reducing electromagnetic radiation caused by signals from the monitor. The protection includes image scrambling using Arnold transform that randomly “shuffle” the lines in each frame.


2021 ◽  
Vol 1 (4) ◽  
pp. 333-340
Author(s):  
Sofyan ◽  
Muh Imam Quraisy ◽  
Mardewi ◽  
Siti Nur Asia

Monitoring the identity of library visitors is a very important part. Usually to monitor students who are diligent in visiting the school library by providing books or guest books, the purpose of this study is to record the identity of students who visit the library electronically, in the study describes the monitoring system for library visitors with internet communication lines, database storage media by using descriptive method. The design of this system consists of a library card, RFID, Nodemcu, 2 x 16 LCD, and a web as an application used to process visitor identities or as a place to display information in real time. The web application design uses the programming language HyperText Markup Language (HTML), Cascading Style Forms (CSS), Hypertext Preprocessor (PHP), Content Management System (CMS) using a MySQL database while the test results show that this system can work well, with the The school library visitor monitoring system using internet-based RFID and nodemcu can make it easier for employees to view and process the identity of library visitors


2021 ◽  
Vol 2086 (1) ◽  
pp. 012090
Author(s):  
M E Makarov ◽  
A A Sapegin ◽  
R T Minnullin

Abstract This paper is devoted to numerical simulation of a non-volatile photonic memory cell based on phase-change material Ge2Sb2Te5. The parameters of light propagation are presented for both crystalline and amorphous Ge2Sb2Te5 phases. The cell structure is optimized for a single TE-mode regime that is suitable for short- and long-distance communication lines.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


2021 ◽  
Author(s):  
Jahangir Abbas Mohammed

This paper proposes a secure two-factor authentication (TFA) system that relies on a password and a crypto-capable device. In cases like a compromise of communication lines, server or device vulnerabilities, and offline and online attacks on user passwords, the approach provides the highest feasible security bounds given the collection of compromised components. Using either SAS Message Authentication or any PIN-based Authentication, the suggested approach constructs a TFA scheme. The paper also proposes a secure software architecture for implementing an enhanced public key cryptography system for mobile applications and an efficient implementation of this modular structure that can use any password-based client-server authentication method without relying on risky single- layer password authentication architecture.


Author(s):  
Duo Wang ◽  
Adrián Ramírez ◽  
Rifat Sipahi

Two different connected vehicle models are considered: one based on only using velocity measurements and the other using only headway, where each model is affected by delays due to human reaction times and sensing and communication lines. The presence of delays is established between any two vehicles that are neighbors as determined by the underlying network topology. The main focus here is to put light into our understanding of how much of time delay can the equilibrium of these models tolerate before becoming unstable. To this end, we compute, using the parallel processing computational tool Delay Margin Finder (parDMF), the delay margin of the equilibrium dynamics and discuss design trade-offs. We report that delay margin in the headway-only model is much less sensitive against the presence/absence of links in the network and that this model can have larger delay margin when larger number of vehicles are capable of communicating with other vehicles in the platoon.


Author(s):  
С.И. Носков ◽  
М.П. Базилевский ◽  
Ю.А. Трофимов ◽  
А. Буяннэмэх

В статье рассматривается проблема разработки (формирования) функции эффективности (агрегированного критерия, свертки критериев) входящих в состав Улан-Баторской железной дороги (УБЖД) участков, которая содержала бы специальным образом взвешенные частные характеристики качества функционирования этих участков. Решение этой проблемы осуществляется на основе разработанной в Иркутском государственном университете путей сообщения информационно-вычислительной технологии (ИВТ) многокритериального оценивания эффективности функционирования сложных социально-экономических и технических систем. ИВТ позволяет на модельном уровне оценивать эту эффективность одним числом (выраженным, например, в процентах), что открывает широкие возможности в управлении этими системами, поскольку позволяет выполнять, в частности, масштабный многофакторный сравнительный анализ деятельности однородных организационных и других структур и принимать на этой основе решения самого различного характера. Построена функция эффективности функционирования участков УБЖД, включающая в свой состав взвешенные частные индикаторы такой эффективности: погрузка, статическая нагрузка, выгрузка, отправление вагонов, перевозка пассажиров, простои вагонов с одной переработкой, простои местных вагонов, простои транзитных вагонов с переработкой, простои транзитных вагонов без переработки. На основе этой функции рассчитана масштабированная на сто процентов эффективность каждого участка. При этом все показатели предпочтения упорядочены по убыванию значимости. Подобная информация, формируемая с годичной периодичностью, может быть весьма полезна руководству УБЖД для принятия широкого спектра управленческих, в том числе кадровых, решений. Аналогичная работа может быть выполнена в интересах РАО РЖД. The article discusses the problem of developing (forming) an efficiency function (aggregated criterion, convolution of criteria) of the sections included in the Ulan Bator Railway (UBZhD), which would contain specially weighted private characteristics of the quality of the functioning of these sections. The solution to this problem is carried out on the basis of the information and computational technology (ICT) developed at the Irkutsk State University of communication lines for multi-criteria assessment of the effectiveness of the functioning of complex socio-economic and technical systems. IWT makes it possible at the model level to evaluate this efficiency by one number (expressed, for example, as a percentage), which opens up ample opportunities in the management of these systems, since it allows performing, in particular, a large-scale multifactorial comparative analysis of the activities of homogeneous organizational and other structures and on this basis solutions of the most varied nature. The function of the effectiveness of the functioning of the UBZhD sections has been built, which includes weighted private indicators of such efficiency: loading, static load, unloading, dispatch of cars, transportation of passengers, idle time of cars with one processing, idle time of local cars, idle time of transit cars with processing, idle time of transit cars without processing. Based on this function, a 100% scaled efficiency is calculated for each site. Moreover, all preference indicators are sorted in descending order of importance. Such information, generated on a yearly basis, can be very useful to the UBZhD leadership for making a wide range of managerial, including personnel, decisions. Similar work can be performed in the interests of RAO Russian Railways.


2021 ◽  
Vol 5 (3 (113)) ◽  
pp. 92-100
Author(s):  
Sergii Kiforuk

The lack of recommendations in the normative and technical documentation related to fiber-optic communication lines (FOCL) for assessing their technical condition necessitated devising a method to control the lines' quality and reliability of operation. The method creates the basis for calculating the quality and reliability indicators of FOCL operation and suggests measures to improve them. It determines the methods of control, as well as the acquisition, accounting, and analysis of damage statistics with and without interruption of communication. The graphic sequence of implementation of the stages of the method demonstrates that resolving the task to control these indicators should involve: – managing the acquisition and actual acquisition of operational data on damages (the causes, nature, quantity, the duration of communication breakdown and complete elimination of damage); – determining the quality and reliability indicators of FOCL operation annually; – analysis of the obtained results and the development (correction) of measures to comply with the norms of these indicators; – the implementation of measures to comply with the norms of quality and reliability of FOCL operation (if necessary). Based on the operational data from a line operator acquired over three years in the specified climatic zone (a cable of the type OKLBg-3 DA12-3×4E-0.4F3.5/0.22N18-12/0), the methodical component of the method was examined. The obtained results on the operational quality (damage density, average damage duration, break (downtime) of communication) and reliability indicators (FOCL readiness factor) of a subscriber access network without reservation showed that the line had low efficiency. The communication breakdown over three years amounted to K=12,569.8 stream∙hours. The downtime at this volume of digital stream∙hours has led to significant economic losses. Line operators have been given recommendations for the proper FOCL operation and ensuring a normalized value of the line readiness coefficient. To this end, it is necessary to reduce the time to re-link and prolong the line's failure-free operation


Actuators ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 281
Author(s):  
Yousef Alipouri ◽  
Lexuan Zhong

State observers are essential components of a modern control system. It is often designed based on a mathematical model of the process, thus requiring detailed process knowledge. However, in the existing state estimation methods, equal delays are commonly assumed for all communication lines, which is unrealistic and poses problems such as instability and a degraded performance of observers when unequal time delays exist. In this paper, a design of observers considering the measurement delays is presented. To deal with this problem, a chain-based observer has been proposed in which each chain deals with one output delay, performs prediction for the unavailable output value, and passes it to the next chain. Convergence of each chain observer as well as overall state estimation were proven. To illustrate the performance of the proposed scheme, simulation studies were performed on a benchmark continuous stirred tank heater (CSTH) process.


Sign in / Sign up

Export Citation Format

Share Document