To see the other types of publications on this topic, follow the link: Telecommunication systems Mathematical models.

Journal articles on the topic 'Telecommunication systems Mathematical models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Telecommunication systems Mathematical models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kanaev, Andrey, Elina Login, and Kseniya Pudovkina. "Informational Model of Promising Database in the System of Management for Carrier Ethernet Telecommunication Network." Proceedings of Petersburg Transport University 19, no. 3 (September 25, 2022): 421–31. http://dx.doi.org/10.20295/1815-588x-2022-3-421-431.

Full text
Abstract:
Purpose: To develop an informational model of a promising database in the system of management of telecommunication network which uses Carrier Ethernet technology for to ensure the efficiency of storage, access and update of data on the telecommunication network functioning that will allow to increase the operativeness of implementation of OAM (Operation, Administration and Management) control-management built-in processes at timely and reasonable decision-making on telecommunication network management in conditions of high dynamics of changes in the network state as well as in view of Carrier Ethernet technology specificities. Thus, in order to provide services of given quality, an information model of database in telecommunication network management system has been created with indication of information main sources which’re represented by subsystems and models of telecommunications network management system in accordance with the previously developed three-level conceptual model. Also, to achieve the stated goal a logical structure of the obtained database information model on the example of domain objects has been developed. Methods: Fundamentals of complex process management theory; theory of multi-agent systems of management of distributed object; theory of systems of information storage and presentation; object-oriented projection method; set-theoretic approach for the description of data set about a control object. Results: The obtained informational model of database and the developed logical three-level structure of functioning are described verbally and mathematically. The evaluation of functioning of the proposed logical structure of the database in the system of telecommunication network management using Carrier Ethernet technology and OAM mechanisms is given. The directions of further research towards development of the models of major processes of collection, processing and provision of data on functioning of subsystems in the system of telecommunications network management are proposed. Practical significance: The developed informational model of database in the system of telecommunications network management differs from well-known ones by the possibility of accounting for and including in the data of the implementation of the complex of unique models of functioning and management of Carrier Ethernet telecommunication network and the mechanisms of OAM management, that were previously obtained by the authors and represent subsystems in the telecommunications network management system with the use of Carrier Ethernet technology possibilities.
APA, Harvard, Vancouver, ISO, and other styles
2

Verkhova, G., and H. Khoder. "Morphological Method of Combinatorial Synthesis of Bus-Modular Systems Based on Multi-Aspect Models." Proceedings of Telecommunication Universities 5, no. 4 (2019): 88–98. http://dx.doi.org/10.31854/1813-324x-2019-5-4-88-98.

Full text
Abstract:
This article presents morphological method of combinatorial synthesis of bus-modular systems developed by the authors, which can be used in automation systems for aggregating electronic means and telecommunication systems. Original results obtained by the authors in the field of mathematical formulation of the synthesis problem of bus-modular systems are presented. It is shown that existing mathematical models cannot be used to effectively solve the synthesis problem of this class of systems. Original multi-aspect models of bus-modular systems are proposed that take into account the different types of compatibility of the modules from which the system is synthesized. The results of the development of complex and qualimetric models of bus-modular systems, as well as original algorithms for automatic generating of objective function according to given technical-economic requirements and algorithms for automatic filtering and ranking of the morphological set of modules are presented.
APA, Harvard, Vancouver, ISO, and other styles
3

Mamonchikova, A. S. "FORMALIZATION OF INFORMATION CONFLICT BASED ON DYNAMIC SYSTEMS THEORY." H&ES Research 12, no. 6 (2020): 68–75. http://dx.doi.org/10.36724/2409-5419-2020-12-6-68-75.

Full text
Abstract:
Setting the task: the progressive development of means of destabilizing effects on the telecommunication system requires improvement of the scientific and methodological apparatus for modeling effects from such effects. To date, dynamic processes of information conflict remain insufficiently studied in conditions of joint influence of means of destabilizing effects and technical means of exploration on telecommunication system. Problem situation: presence of integral effects on telecommunication system of technical means of exploration and means of destabilizing effects, in the absence of models formalizing such tripartite interactions. The direction of formalization of information conflict on the basis of the theory of dynamic systems taking into account the time parameters of its development is not sufficiently developed. The goal is to build a model of a three-way dynamic information conflict. Methods used: mathematical apparatus of dynamic systems theory is used to construct a mathematical model of information conflict and its research. The model itself is represented as a system of differential equations. The subject of the study is the ratio of competitive distribution of information resources between the parties to the information conflict. Object of research: telecommunication system under the influence of destabilizing effects and technical means of exploration. Scientific novelty: for the first time for the developed model three sides of dynamic conflict are presented, taking into account the dynamics of development of information conflict in time, different degrees of conflict interaction between individual parties are taken into account, synthesis of universal approaches generalizing dynamic information conflict between the three sides is presented. Practical significance: The proposed model can be used to explore a broad class of conflict interactions in application areas in different spheres. It will be useful in dealing with such dynamic conflicts involving three or more parties.
APA, Harvard, Vancouver, ISO, and other styles
4

Akhmetshina, Eleonora G. "MODELING DATA TRANSMISSION SYSTEMS USING MODERN INFORMATION TECHNOLOGIES." T-Comm 15, no. 8 (2021): 52–57. http://dx.doi.org/10.36724/2072-8735-2021-15-8-52-57.

Full text
Abstract:
When modeling data transmission systems for various purposes, including computer and telecommunication networks, both components of mathematical modeling are widely used. These are simulation modeling and analytical modeling based on queuing theory. At the same time, researchers can always compare the results obtained by means of simulation and analytical modeling. From modern technologies of simulation modeling, one can single out the IT GURU Academic Edition technologies, represented by the Opnet Modeler and Riverbed Modeler software products with powerful graphical editors. Graphic editors allow you to create simulation models of data transmission systems of any complexity, and launch and run their models to obtain statistics of the main performance indicators of these systems. Comparison of the simulation results with the results of queuing systems (QS) of the G/G/1 type makes it possible to assess the adequacy of those and other mathematical models. This article summarizes the results of the author’s publications on G/G/1 systems based on time-shifted distribution laws such as exponential, hyperexponential, and Erlang distribution. Thus, these distribution laws for the random variables used provide the coefficients of variation less than, equal or greater than one. This fact is important from the point of view of the queuing theory, because the average delay of claims in the system directly depends on the coefficients of variations in the time intervals for the arrival and servicing of claims.
APA, Harvard, Vancouver, ISO, and other styles
5

Osipyan, V. O., K. I. Litvinov, and A. S. Zhuck. "Research and development of the mathematic models of cryptosystems based on the universal Diophantine language." SHS Web of Conferences 141 (2022): 01020. http://dx.doi.org/10.1051/shsconf/202214101020.

Full text
Abstract:
This paper shows the objective necessity of improving the information security systems under the development of information and telecommunication technologies. The paper for the first time involves a new area of NP-complete problems from Diophantine analysis, namely, multi-degree systems of Diophantine equations of a given dimension and degree of Tarry-Escott type. Based on a fundamentally new number-theoretic method, a mathematical model of an alphabetic information security system (ISS) has been developed that generalizes the principle of building cryptosystems with a public key – the so called dissymmetric bigram cryptosystem. This implies to implement direct and inverse transformations according to a given algorithm based on a two-parameter solution of a multi-degree system of Diophantine equations. A formalized algorithm has been developed for the specified model of a dissymmetric bigram cryptosystem and a training example based on a normal multi-degree system of Diophantine equations of the fifth degree is presented.
APA, Harvard, Vancouver, ISO, and other styles
6

Ratti, Francesca, Maurizio Magarini, and Domitilla Del Vecchio. "What Is the Trait d’Union between Retroactivity and Molecular Communication Performance Limits?" Molecules 27, no. 10 (May 13, 2022): 3130. http://dx.doi.org/10.3390/molecules27103130.

Full text
Abstract:
Information exchange is a critical process in all communication systems, including biological ones. Retroactivity describes the load that downstream modules apply to their upstream systems in biological circuits. The motivation behind this work is that of integrating retroactivity, a concept proper of biochemical circuits, with the metrics defined in Information Theory and Digital Communications. This paper focuses on studying the impact of retroactivity on different biological signaling system models, which present analogies with well-known telecommunication systems. The mathematical analysis is performed both in the high and low molecular counts regime, by mean of the Chemical Master Equation and the Linear Noise Approximation, respectively. The main goal of this work is to provide analytical tools to maximize the reliable information exchange across different biomolecular circuit models. Results highlight how, in general, retroactivity harms communication performance. This negative effect can be mitigated by adding to the signaling circuit an independent upstream system that connects with the same pool of downstream circuits.
APA, Harvard, Vancouver, ISO, and other styles
7

Humbatov, R. T., B. G. Ibrahimov, A. A. Alieva, and R. F. Ibrahimov. "Approaches to the Analysis Performance Indicators Multiservice Telecommunication Networks Based on SDN Technology." INFORMACIONNYE TEHNOLOGII 27, no. 8 (August 11, 2021): 419–24. http://dx.doi.org/10.17587/it.27.419-424.

Full text
Abstract:
The quality of functioning multiservice telecommunication networks based on the architectural concept Next Generation Network (NGN) and Future Networks (FN) using modern innovative technologies has been analyzed. Based on the study, a new approach to the construction model for assessing performance indicators multiservice telecommunication networks based on SDN (Software Defined Networking) technologies, taking into account the property self-similarity traffic is proposed. On the basis of the proposed approach, complex indicators MTS were investigated, taking into account the requirement QoS (Quality of Service) and QoE (Quality of Experience). The mathematical apparatus and the results of the study throughput software and hardware complexes, the probabilistic-time characteristics of the network and the management physical resources in the provision multimedia services are presented. Models have been investigated and analytical expressions have been obtained for the assessment complex indicators of the quality offunctioning MTS in the provision multimedia services with the necessary parameters. А numerical analysis is carried out and a graphical dependence of the maximum network throughput on the total number software and hardware systems for a given system load factor is built.
APA, Harvard, Vancouver, ISO, and other styles
8

Rezghdeh, Keyvan, and Sajjad Shokouhyar. "A six-dimensional model for supply chain sustainability risk analysis in telecommunication networks: a case study." Modern Supply Chain Research and Applications 2, no. 4 (May 19, 2020): 211–46. http://dx.doi.org/10.1108/mscra-09-2019-0018.

Full text
Abstract:
PurposeThe main purpose of the present study was to improve and develop previously proposed models for Iran telecommunication networks. It should be noted that the six-dimensional (6D) sustainability model used in this study will be a useful and comprehensive model for industries. Since, the new dimension of IT along with the five well-known economic, social, environmental, technical and institutional aspects of organizations is considered to have great impacts on supply chain sustainability; the proposed framework can be practical.Design/methodology/approachAccording to the related literature review, there are two research streams in supply chain management. The first stream is exploratory research, seeking out conceptual discussions in this area. The second one is associated with mathematical models and techniques, aiming to set decision-making rules in this regard (Agrell et al., 2004). In this study, evaluation was performed using the FMEA method as an analytical technique based on the principle of pre-occurrence prevention to identify potential failure factors in sensitive systems (Mohammadfam and Kianfari, 2008).FindingsAfter identifying the risks and causes of the incidence and effects and consequences of risks, preventive and risk control measures and advisory strategies were presented. Customers with 45.76% share in critical risks are threatening to maintain supply chain in these companies. During this study, it was found that 33.9% of the main source of supply chain critical risks was customers, constituting 45.76% of such risks, accompanied by organization, having a 38.88% share of critical risk generation. The study findings also revealed that 33.9% of critical risks were mainly (equally) related to economic and technical aspects of supply chain sustainability in telecommunication networks. Moreover, as a newly-introduced sixth dimension, IT represented 10.17% of critical risks threatening supply chain sustainability in such networks. Critical risks are mainly related to the economic and technical aspects (equally) with the sustainability of the telecommunication networks supply chain. Also, as a new finding and the sixth dimension, 10.17% of the critical risks that threaten the sustainability of the telecommunication networks supply chain have the information technology dimension.Originality/valueThe internet and fixed and mobile data services are provided by several private companies in Iran, which are relatively similar in terms of their supply chains. In order to manage the sustainability of Iran's telecommunication supply chain, telecommunication networks affiliated to Iran Telecommunication Company (ITC), operating in the field of data and internet services and fixed telephone were selected in 31 provinces. The intended networks were also providing an important part of the country's needs including Mobile Telecommunication Company of Iran, a subsidiary of Iran's telecommunication networks, as one of the top companies in this industry. Accordingly, all the networks studied in this study needed to be identified with regard to communication sustainability risks, since they provide management solutions to each other by segregating risks. In this study, 68 managers and 72 experts participated in different work teams of telecommunication networks.
APA, Harvard, Vancouver, ISO, and other styles
9

Veksler, V. A. "CONSTRUCTION OF NEURAL NETWORKS IN ONLINE ENVIRONMENTS WHEN STUDYING THE CONTENT LINE "MODELING AND FORMALIZATION" IN THE LESSONS OF INFORMATICS AT SCHOOL." Informatics in school 1, no. 7 (October 30, 2020): 21–24. http://dx.doi.org/10.32517/2221-1993-2020-19-7-21-24.

Full text
Abstract:
Modeling as a universal approach to the study of the structure and behavior of complex objects is used in many academic disciplines, as it is a general didactic means of acquiring knowledge. A promising direction in the development of mathematical modeling is modeling the behavior of intelligent systems, which is being improved due to the introduction of new information technologies, telecommunication systems and the massive use of computer technology. Modeling takes on the functionality of a powerful and effective tool for researching a variety of intelligent systems from various fields of human activity. One of the most popular methods for studying the functioning of intelligent systems are machine learning methods for processing large amounts of data, in particular, the apparatus of neural networks. The article discusses the features of constructing the simplest neural networks by using the Teachable Machine online system and online compilers of programming languages in the classroom on computer modeling at school. Detailed examples of building neural network models in Python and C ++ programming languages are given.
APA, Harvard, Vancouver, ISO, and other styles
10

Ozdemir, Neslihan, Aydin Secer, Muslum Ozisik, and Mustafa Bayram. "Two Analytical Schemes for the Optical Soliton Solution of the (2 + 1) Hirota–Maccari System Observed in Single-Mode Fibers." Universe 8, no. 11 (November 4, 2022): 584. http://dx.doi.org/10.3390/universe8110584.

Full text
Abstract:
In this scientific research article, the new Kudryashov method and the tanh-coth method, which have not been applied before, are employed to construct analytical and soliton solutions of the (2+1)-dimensional Hirota–Maccari system. The (2+1)-dimensional Hirota–Maccari system is a special kind of nonlinear Schrödinger equation (NLSEs) that models the motion of isolated waves localized in a small part of space, and is used in such various fields as fiber optics telecommunication systems, nonlinear optics, plasma physics, and hydrodynamics. In addition, the Hirota–Maccari system defines the dynamical characters of femtosecond soliton pulse propagation in single-mode fibers. Analytical solutions of the model are successfully acquired with the assistance of symbolic computation utilizing these methods. Finally, 3D, 2D, and contour graphs of solutions are depicted at specific values of parameters. It is shown that the new Kudryashov method and the tanh-coth method are uncomplicated, very effective, easily applicable, reliable, and indeed vital mathematical tools in solving nonlinear models.
APA, Harvard, Vancouver, ISO, and other styles
11

Piltyay, Stepan, Andrew Bulashenko, Hanna Kushnir, and Oleksandr Bulashenko. "Information Resources Economy in Satellite Systems based on New Microwave Polarizers with Tunable Posts." Path of Science 6, no. 11 (November 30, 2020): 5001–10. http://dx.doi.org/10.22178/pos.64-6.

Full text
Abstract:
One of the fundamental problems of modern digital telecommunications is the economy of digital information and frequency resources, which are highly limited. The introduction of novel telecommunication systems and 5G networks requires searching for principal solutions for the economy and reusing the frequency spectrum. Therefore, modern wireless mobile, terrestrial, and satellite systems use various new technologies to increase communication channels' information capacity for the economy of limited frequency resources. One of the most effective ways to reuse the information system's operating frequency band is to apply antennas with polarisation signal processing. Such systems provide the possibility to transmit and to receive simultaneously signals with different types of polarisation. Consequently, the application of electromagnetic waves with two orthogonal polarisations improves wireless systems' information characteristics for various purposes. This allows doubling the information capacity of mobile, terrestrial, and satellite communication channels. Also, polarisation processing is carried out in meteorological and radar systems to receive, transmit, and process information. The essential elements of such systems are microwave polarisers and orthomode transducers. The electromagnetic characteristics of these devices affect the aspects of the whole system significantly. Main electromagnetic factors include phase, matching, and polarisation parameters. The article presents the development of a compact tunable polarizer based on a square waveguide with three posts. The developed polariser operates in the X-band from 8.0 GHz to 8.5 GHz. Created a mathematical model of the polariser is based on the scattering and transmission matrices. To verify the developed theoretical model's correctness, the calculation of all characteristics was also performed numerically using the finite integration technique. The developed compact polariser based on a square waveguide with three posts allows tuning it's matching and polarisation characteristics by changing all posts' heights. The developed polariser's main advantages are small dimensions, tuning options, and aspects of polarisation transformation.
APA, Harvard, Vancouver, ISO, and other styles
12

Dudin, Alexander N., and Shoichi Nishimura. "Optimal control for a BMAP/G/1 queue with two service modes." Mathematical Problems in Engineering 5, no. 3 (1999): 255–73. http://dx.doi.org/10.1155/s1024123x99001088.

Full text
Abstract:
Queueing models with controllable service rate play an important role in telecommunication systems. This paper deals with a single-server model with a batch Markovian arrival process (BMAP) and two service modes, where switch-over times are involved when changing the service mode. The embedded stationary queue length distribution and the explicit dependence of operation criteria on switch-over levels and derived.
APA, Harvard, Vancouver, ISO, and other styles
13

Sitnikov, Ivan R., and Alexander V. Golikov. "Rationalization of the constructive form of towers with prestressed cables." Structural Mechanics of Engineering Constructions and Buildings 15, no. 3 (December 15, 2019): 182–92. http://dx.doi.org/10.22363/1815-5235-2019-15-3-182-192.

Full text
Abstract:
Relevance. One of the main directions of development of mobile communication systems, radio engineering and telecommunication systems is the improvement of the structural form of the bearing supports, which will solve a number of practical tasks: to increase the coverage area, to ensure higher rates of data transmission speed and to ensure stable operation in an increasing number of users. These circumstances justify the relevance of research in this direction. Aims of research. Optimization of design solutions using parallel puffs, ensuring the possibility of erection and safe operation during the entire service life, which ensures that the requirements for strength, stability and deformations for such structures are met with minimal material consumption. Methods. For calculations, finite element methods are used for mathematical modeling using software and computing systems. To create linear models for numerical experiments, the method of mathematical planning of experiments was used. Results. The work of the towers of the proposed constructive solution is considered as supports for the placement of equipment of cellular operators using the example of a 42-meter tower. The method of mathematical planning of experiments was used to create a model line for numerical experiments. To establish the basic characteristics of the stress-strain state of the structures of the supports, a number of models were created and calculated in software packages, the basis of which is the finite element method. A comparative analysis of the effort in the delays determined by analytical calculation and the finite element method is performed. The analysis of changes in the stress-strain state of the towers from the influence of influencing factors, such as wind and icy-wind loads, the angle of deflection on the lower tier of the tower. By the criterion of minimum metal consumption and manufacturability of the construction of towers, rational overall dimensions of the tower were determined. The options for constructing the main junctions of the elements of the tower are proposed.
APA, Harvard, Vancouver, ISO, and other styles
14

Kharchenko, R. Yu, A. V. Kochetkov, and V. S. Mikhaylenko. "ANALYSIS OF METHODS FOR AUTOMATED RESEARCH OF DC VOLTAGE CONVERTERS OF MODULAR STRUCTURE." Radio Electronics, Computer Science, Control, no. 3 (October 1, 2022): 7. http://dx.doi.org/10.15588/1607-3274-2022-3-1.

Full text
Abstract:
Context. DC voltage converters (DCV) are part of modern power supply systems (PSS) and power supply ensuring the operation of electronic and radio devices, telecommunication systems and communication and to a large extent determine their power consumption, reliability, time of readiness for operation, weight, size and cost indicators. Even though there are a large number of different software packages used in engineering practice for the study and design of radio engineering devices, such computer-aided design (CAD) systems and virtual computer simulation of electronic circuits have some limitations that do not allow to quickly carry out the entire complex of studies of DCV required for the analysis of electrical processes in various operating modes. Objective. In this section, the goal is to select the most suitable methods and algorithms that allow the development of software necessary for solving the problems of research and analysis of electrical processes for select energy parameters of the DCV of a modular structure in a separate power channel (PWC). Method. The paper proposes a method that consists in using mathematical models describing electrical processes in DC voltage converters and creating, on the basis of the developed calculation algorithms, specialized software for the automated study of electrical processes in the DCV of a modular structure using a computer. Results. The paper discusses the main methods of automated research of radio engineering devices, which can be used to analyze the electrical processes of pulsed DC voltage converters of a modular structure. Algorithms of calculation are given and, as an example, some results of automated research obtained using this method. Conclusions. The analysis of the known methods of automated research of DC voltage converters of modular structure is carried out. Their advantages and disadvantages are given. It is shown that the most suitable method is based on the use of mathematical models describing electrical processes in DC voltage converters of this type. On the basis of the mathematical models presented in the second section of the work, algorithms and specialized software have been developed that allow them to be widely used in the automated research and design of modular-structured DC voltage converters.
APA, Harvard, Vancouver, ISO, and other styles
15

Grindrod, P., and D. J. Higham. "Models for evolving networks: with applications in telecommunication and online activities." IMA Journal of Management Mathematics 23, no. 1 (February 14, 2011): 1–15. http://dx.doi.org/10.1093/imaman/dpr001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Andriyanov, Nikita A., Madina-Bonu R. Atakhodzhaeva, and Evgeny I. Borodin. "Mathematical modeling of recommender system and data processing of a telecommunications company using machine learning models." Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control & Radioelectronics 22, no. 2 (April 2022): 17–28. http://dx.doi.org/10.14529/ctcr220202.

Full text
Abstract:
The purpose of the study is to develop data modeling methods for projecting recommender algorithms using doubly stochastic autoregressive models of random processes and checking their adequacy by applying machine learning algorithms to cluster users in a simulated data set and predict probabilities of interest. Research methods. The article discusses the methods used in the construction of recommender systems. At the same time, the problem of modeling user behavior using a doubly stochastic model is considered. This model is proposed for generating artificial data. The doubly stochastic model allows generating non-stationary processes, thus creating users with different probabilistic properties in different groups of objects of interest. After that, artificially created users (and their activity) are clustered based on a modified K-means algorithm. The main modification is the need for automatic pre-estimation of the number of clusters, and not its choice by a person. Next, the behavior of representatives of each user group for new events is modeled. Based on the generated information and training data, the problem of predictiing and ranking the services offered is solved. At the same time, at the first stage, the use of regression models is sufficient to assign users to a group and form offers for this user. Results of the study. On the training data in 2 clusters, high determination indices were achieved, which indicates approximately 90% of the explained variance when using the proposed doubly stochastic model. Particular attention is paid to the work of modern recommender systems on the example of the Disco system developed by Yandex. In addition, pre-processing and preliminary analysis of data from the real sector was performed, namely, the data of a telecommunications company are being studied. For the purpose of issuing relevant proposals for communication services, a test recommender system has been developed. Conclusion. Thus, the main results of the work include a mathematical model that simulates the reaction of users to various services, as well as a logistic regression model used to predict the probability of a user's interest in a new service. Based on predicted probabilities, it is not difficult to rank new proposals. Approbation on the synthesized data showed the high efficiency of the model.
APA, Harvard, Vancouver, ISO, and other styles
17

Kozel, V. M., D. A. Podvornaya, and K. A. Kovalev. "Peal factor of signals of 5G mobile service systems." Doklady BGUIR 18, no. 6 (October 1, 2020): 5–10. http://dx.doi.org/10.35596/1729-7648-2020-18-6-5-10.

Full text
Abstract:
This article discusses the possible formats of signals of 5G mobile communication networks (NR, IMT-2020): configurations of the number of resource blocks and frequency shifts of subcarriers. modulation schemes, organizations of the physical level, as well as the broadband signals of these networks and, as a result, the need for introducing a margin on the linearity of the transceiver’s paths to eliminate distortion or the manifestation of blocking effects when the signal interferes with third-party means. We analyze the characteristics of the dynamic range of the signals from IMT-2020 ground mobile systems and make a conclusion about the noise-like signals. To find the ratio of the maximum amplitude to its average value and a given ratio not exceeded with a given probability, the Matlab mathematical models were used. We infer that the law of probability distribution of the module of the instantaneous amplitude of the 5G signals corresponds to the distribution characteristic of narrow-band radio noise. Based on the study, the peak factor of the signal of the IMT-2020 ground mobile systems for various variations is obtained and a sufficient level of power reserve is provided to ensure, with high probability, the transmission of the 5G signals through radio paths, eliminating signal distortion. The results of this study were applied in the examination of the electromagnetic compatibility of radio electronic devices of cellular mobile communications with existing and promising electronic means of civil and special purposes and in the study of the protection of ground satellite stations from the effects of radio electronic means of IMT-2020 cellular mobile telecommunication networks located at border territories.
APA, Harvard, Vancouver, ISO, and other styles
18

Bobruk, Tomasz. "CHROMATIC DISPERSION COMPENSATION IN EXISTING FIBER OPTIC TELECOMMUNICATION LINES WITH THE GROWING BIT RATES NEEDS OF DWDM SYSTEM." Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska 11, no. 4 (December 20, 2021): 38–41. http://dx.doi.org/10.35784/iapgos.2805.

Full text
Abstract:
The article presents an analysis of the methods of chromatic dispersion compensation in the existing, already built fiber optic telecommunications lines, based on ITU G.652 A and B fibers with the constantly growing demand for bit rates in DWDM systems. Due to the enormous investment costs, it is impossible to replace the cables used with NZDSF, hence the chapter analyzes methods of improving the bandwidth without replacing all cables. Typical models of the optimization of chromatic dispersion in the existing lines are presented.
APA, Harvard, Vancouver, ISO, and other styles
19

Voss, Florian, Catherine Gloaguen, and Volker Schmidt. "Scaling limits for shortest path lengths along the edges of stationary tessellations." Advances in Applied Probability 42, no. 4 (December 2010): 936–52. http://dx.doi.org/10.1239/aap/1293113145.

Full text
Abstract:
We consider spatial stochastic models, which can be applied to, e.g. telecommunication networks with two hierarchy levels. In particular, we consider Cox processes XL and XH concentrated on the edge set T(1) of a random tessellation T, where the points XL,n and XH,n of XL and XH can describe the locations of low-level and high-level network components, respectively, and T(1) the underlying infrastructure of the network, such as road systems, railways, etc. Furthermore, each point XL,n of XL is marked with the shortest path along the edges of T to the nearest (in the Euclidean sense) point of XH. We investigate the typical shortest path length C* of the resulting marked point process, which is an important characteristic in, e.g. performance analysis and planning of telecommunication networks. In particular, we show that the distribution of C* converges to simple parametric limit distributions if a scaling factor κ converges to 0 or ∞. This can be used to approximate the density of C* by analytical formulae for a wide range of κ.
APA, Harvard, Vancouver, ISO, and other styles
20

Baglietto, Marco, Raffaele Bolla, Franco Davoli, Mario Marchese, and Maurizio Mongelli. "Integration of pricing models between best-effort and guaranteed performance services in telecommunication networks." Control Engineering Practice 11, no. 10 (October 2003): 1209–26. http://dx.doi.org/10.1016/s0967-0661(03)00055-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Kostyria, O., V. Storozhenko, and V. Naumenko. "Compensation of Multipath Interference in a Separated Passive Time and Frequency Synchronization Systems." Metrology and instruments, no. 4 (September 7, 2019): 17–23. http://dx.doi.org/10.33955/2307-2180(4)2019.17-23.

Full text
Abstract:
Multipath propagation of radio waves negatively affects to the performance of telecommunications and radio navigation systems [1, 3]. When performing time and frequency synchronization tasks of spatially separated standards, the multi­path signal propagation aggravates the probabi­lity of a correct synchronization and introduces an error. The presence of a multipath signal reduces the signal-to-noise ratio in the received signal, which in turn causes an increase in the synchronization error. The mathematical models of multipath interference suppression in the time and in the frequency domain are presented in the article. Compared to time processing, processing in the frequency domain reduces computational costs. The operation of suppression in the time domain has been verified experimentally.
APA, Harvard, Vancouver, ISO, and other styles
22

Tarasov, V. N. "MATHEMATICAL DELAY MODEL BASED ON SYSTEMS WITH HYPERERLANGIAN AND ERLANGIAN DISTRIBUTIONS." Radio Electronics, Computer Science, Control 1, no. 1 (March 27, 2021): 87–96. http://dx.doi.org/10.15588/1607-3274-2021-1-9.

Full text
Abstract:
Context. Studies of G/G/1 systems in queuing theory are relevant because such systems are of interest for analyzing the delay of data transmission systems. At the same time, it is impossible to obtain solutions for the delay in the final form in the general case for arbitrary laws of distribution of the input flow and service time. Therefore, it is important to study such systems for particular cases of input distributions. We consider the problem of deriving a solution for the average queue delay in a closed form for two systems with ordinary and shifted hypererlangian and erlangian input distributions. Objective. Obtaining a solution for the main characteristic of the system – the average delay of requests in the queue for two queuing systems of the G/G/1 type with ordinary and with shifted hypererlangian and erlangian input distributions. Method. To solve this problem, we used the classical method of spectral decomposition of the solution of the Lindley integral equation. This method allows to obtaining a solution for the average delay for systems under consideration in a closed form. The method of spectral decomposition of the solution of the Lindley integral equation plays an important role in the theory of systems G/G/1. For the practical application of the results obtained, the well-known method of moments of probability theory is used. Results. For the first time, spectral expansions of the solution of the integral Lindley equation for two systems are obtained, with the help of which calculation formulas for the average delay in a queue in a closed form are derived. Thus, mathematical models of queuing delay for these systems have been built. Conclusions. These formulas expand and supplement the known queuing theory formulas for the average delay G/G/1 systems with arbitrary laws distributions of input flow and service time. This approach allows us to calculate the average delay for these systems in mathematical packages for a wide range of traffic parameters. In addition to the average delay, such an approach makes it possible to determine also moments of higher orders of waiting time. Given the fact that the packet delay variation (jitter) in telecommunications is defined as the spread of the delay from its average value, the jitter can be determined through the variance of the delay.
APA, Harvard, Vancouver, ISO, and other styles
23

Zaitseva, Alina, Nikolai Dudayev, Evgeny Zaitsev, and Dmitry Kilmakov. "HIGH-PERFORMANCE COMPUTING COMPLEX FOR INTELLIGENT TRANSPORT SYSTEM." Electrical and data processing facilities and systems 18, no. 2 (2022): 107–20. http://dx.doi.org/10.17122/1999-5458-2022-18-2-107-120.

Full text
Abstract:
Relevance The relevance of this research project lies in the development of algorithmic support for routes in transport systems, which will allow efficient, efficient and rational management of the transport complex. The development of modern motor transport is already unthinkable without the use of intelligent transport systems (ITS). ITS is an intelligent system that uses innovative developments in the modeling of transport systems and regulation of traffic flows, providing end users with greater information content and safety, as well as qualitatively increasing the level of interaction of traffic participants compared to conventional transport systems. ITS, based on the interaction of one vehicle with another and the vehicle with the road infrastructure, should ensure high efficiency and safety of road traffic. ITS really increases the «time horizon», the quality and reliability of information about the immediate situation on the road, the location of other vehicles and road users, to ensure greater safety and mobility. Intelligent systems provide information about cars and their location on the road, information about road conditions, allow you to optimize and secure traffic on the road network, as well as speed up response to traffic incidents and accidents. Aim of research The aim of the study is to analyze and study current trends in the development of intelligent transport systems, as well as to review and study the principles and forms of collecting and transmitting information with its subsequent processing for use by the end user. The objectives of the research project are as follows. 1. Analysis of the basic principles of building high-performance computing systems for an intelligent transport system based on computing and telecommunication components for mass use; 2. Development of the architecture of a high-performance computing complex for ITS; 3. Development of algorithmic support for routes in transport systems. Research methods The research method is to analyze the basic principles of building high-performance computing systems for an intelligent transport system based on computing and telecommunications components for mass use. Results In the course of this research project, a system model of the information and computer complex of intelligent transport systems was developed, which includes functional and information models of the information and computer complex of the intelligent transport system, and algorithmic support for intelligent transport systems was developed, including: routes in transport systems, a routing algorithm based on vector criterion optimization.
APA, Harvard, Vancouver, ISO, and other styles
24

Gupta, Umesh Chandra, Nitin Kumar, Sourav Pradhan, Farida Parvez Barbhuiya, and Mohan L. Chaudhry. "Complete analysis of a discrete-time batch service queue with batch-size-dependent service time under correlated arrival process: D-MAP/Gn(a,b)/1." RAIRO - Operations Research 55, no. 3 (May 2021): 1231–56. http://dx.doi.org/10.1051/ro/2021054.

Full text
Abstract:
Discrete-time queueing models find a large number of applications as they are used in modeling queueing systems arising in digital platforms like telecommunication systems and computer networks. In this paper, we analyze an infinite-buffer queueing model with discrete Markovian arrival process. The units on arrival are served in batches by a single server according to the general bulk-service rule, and the service time follows general distribution with service rate depending on the size of the batch being served. We mathematically formulate the model using the supplementary variable technique and obtain the vector generating function at the departure epoch. The generating function is in turn used to extract the joint distribution of queue and server content in terms of the roots of the characteristic equation. Further, we develop the relationship between the distribution at the departure epoch and the distribution at arbitrary, pre-arrival and outside observer’s epochs, where the first is used to obtain the latter ones. We evaluate some essential performance measures of the system and also discuss the computing process extensively which is demonstrated by some numerical examples.
APA, Harvard, Vancouver, ISO, and other styles
25

Ulugbek, Amirsaidov, and Qodirov Azamat. "Model of optimal distribution of network resources with constraints on quality of service indicators." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 835–42. http://dx.doi.org/10.11591/eei.v12i2.4706.

Full text
Abstract:
Existing algorithms and mathematical models of queuing at the nodes of a telecommunications network are considered in this paper. The necessity of coordinated solutions to problems of distribution of channel and buffer resources of the network is shown. A model for the optimal distribution of channel and buffer resources on network nodes has been developed. The optimization (minimization) criterion is the total average packet delay with constraints on the quality of service (QoS) indicators of heterogeneous flows. The optimization problem is presented as a constrained nonlinear programming problem and solved using the “fmincon” program of the optimization toolbox MATLAB package.
APA, Harvard, Vancouver, ISO, and other styles
26

Брежнєв, Євген Віталійович, Герман Вікторович Фесенко, and Вячеслав Сергійович Харченко. "МЕТОДОЛОГІЧНІ ЗАСАДИ ОЦІНЮВАННЯ ТА ЗАБЕЗПЕЧЕННЯ БЕЗПЕКИ КРИТИЧНИХ ІНФОРМАЦІЙНИХ ІНФРАСТРУКТУР." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 4 (December 20, 2018): 78–85. http://dx.doi.org/10.32620/reks.2018.4.08.

Full text
Abstract:
The world trends in increasing of threats of natural and man-made nature, a level of terrorist threats, the number and complexity of cyberattacks have caused the actualization of needs for critical information infrastructure protection and improvement it's informational security and functional safety. A critical information infrastructure is considered as a set of information and telecommunication systems, improper operation of which may lead to the occurrence of an accident of critical infrastructure (energy, transport, etc.), as well as to decrease in quality of its services. The subject of paper’s study is the mechanisms for ensuring the safety (protection) of critical information infrastructures. The purpose of the paper is to substantiate the approach to the development of methodological foundations and technologies for assessing and ensuring the safety (protection) of critical information infrastructures taking into account the state and capabilities of modern information technologies. The methods used are: systems analysis methods, mathematical optimization methods, safety, and risk theory methods. The following results were obtained. The main tasks of the critical infrastructure protection system are formulated. The necessity of using the system of protection of critical information infrastructure as part of the system of protection of critical infrastructure is substantiated. The concept and principles of the methodology for assessing and ensuring the safety (protection) of critical information infrastructures are developed, working hypotheses, methods and models necessary for their implementation are suggested. The way of interaction of the elements of the proposed methodology, tasks and elements of the critical infrastructure protection system is shown. The results obtained are aimed at solving of one fundamental problem such as the existence of a contradiction between the intensive development of critical information infrastructures, negative influences and threats of various nature and the lack of methodological foundations, models, methods and information technologies for assessment and assurance of critical information infrastructure security and safety. The results obtained should be used to create elements of informational and analytical support for the decision maker in solving tasks related to the assessment and security (protection) of critical infrastructure
APA, Harvard, Vancouver, ISO, and other styles
27

Tarasov, V. N., and N. F. Bakhareva. "DELAY MODELS BASED ON SYSTEMS WITH USUAL AND SHIFTED HYPEREXPONENTIAL AND HYPERERLANGIAN INPUT DISTRIBUTIONS." Radio Electronics, Computer Science, Control, no. 2 (June 26, 2021): 56–64. http://dx.doi.org/10.15588/1607-3274-2021-2-6.

Full text
Abstract:
Context. In the queueing theory, the study of systems with arbitrary laws of the input flow distribution and service time is relevant because it is impossible to obtain solutions for the waiting time in the final form for the general case. Therefore, the study of such systems for particular cases of input distributions is important. Objective. Getting a solution for the average delay in the queue in a closed form for queuing systems with ordinary and with shifted to the right from the zero point hyperexponential and hypererlangian distributions in stationary mode. Method. To solve this problem, we used the classical method of spectral decomposition of the solution of the Lindley integral equation. This method allows to obtaining a solution for the average delay for two systems under consideration in a closed form. The method of spectral decomposition of the solution of the Lindley integral equation plays an important role in the theory of systems G/G/1. For the practical application of the results obtained, the well-known method of moments of probability theory is used. Results. For the first time, a spectral decomposition of the solution of the Lindley integral equation for systems with ordinary and with shifted hyperexponential and hyperelangian distributions is obtained, which is used to derive a formula for the average delay in a queue in closed form. Conclusions. It is proved that the spectral expansions of the solution of the Lindley integral equation for the systems under consideration coincide; therefore, the formulas for the mean delay will also coincide. It is shown that in systems with a delay, the average delay is less than in conventional systems. The obtained expression for the waiting time expands and complements the wellknown incomplete formula of queuing theory for the average delay for systems with arbitrary laws of the input flow distribution and service time. This approach allows us to calculate the average delay for these systems in mathematical packages for a wide range of traffic parameters. In addition to the average waiting time, such an approach makes it possible to determine also moments of higher orders of waiting time. Given the fact that the packet delay variation (jitter) in telecommunications is defined as the spread of the waiting time from its average value, the jitter can be determined through the variance of the waiting time.
APA, Harvard, Vancouver, ISO, and other styles
28

Alekseeva, I. V., O. I. Lysenko, and O. M. Tachinina. "Necessary optimality conditions of control of stochastic compound dynamic system in case of full in-formation about state vector." Mathematical machines and systems 4 (2020): 136–47. http://dx.doi.org/10.34121/1028-9763-2020-4-136-147.

Full text
Abstract:
Stochastic Compound Dynamic Systems (CDS) are complex technical systems that are created through the use of precision mechanics in combination with modern telecommunications and computer technologies. Incertitude in these CDS shows up under the influence of external and internal stochastic perturbations. The constituent elements of CDS are combined into a single system because these elements perform a single complex mission. The information exchange is wireless, there is no mechanical connection between the elements of the CDS. The paper considers groups of unmanned aerial vehicles (UAVs), which are equipped with sensors or multisensors that are able to perform a mobile sensor network. The trajectories of individual elements of the mobile sensor network are trajectories formed under the influence of stochastic perturbations. This fact means that the nature of the mobile sensor network can be classified as a stochastic compound dynamic system and for the mathematical description and optimization of the movement of this system is adequate to use models and methods for optimizing stochastic CDS. The model of CDS motion is considered to be a branching trajectory or, as they say, a branched trajectory. A stochastic mathematical model of the motion of a mobile sensor network, which performs the combined mission of surveying an emergency zone, can be classified as a model of the motion of a stochastic compound dynamic system. This approach is an adequate for mathematical model creation to the mobile sensor network physical condition, for its operation in the zone of natural disaster by natural or anthropogenic origin. This paper is devoted to solving a theoretical problem related to the formulation and proof of the necessary conditions for stochastic CDS moving optimal control along a branched trajectory with an arbitrary branching scheme.
APA, Harvard, Vancouver, ISO, and other styles
29

Almalki, Faris A., and Marios C. Angelides. "Deployment of an aerial platform system for rapid restoration of communications links after a disaster: a machine learning approach." Computing 102, no. 4 (November 21, 2019): 829–64. http://dx.doi.org/10.1007/s00607-019-00764-x.

Full text
Abstract:
AbstractHaving reliable telecommunication systems in the immediate aftermath of a catastrophic event makes a huge difference in the combined effort by local authorities, local fire and police departments, and rescue teams to save lives. This paper proposes a physical model that links base stations that are still operational with aerial platforms and then uses a machine learning framework to evolve ground-to-air propagation model for such an ad hoc network. Such a physical model is quick and easy to deploy and the underlying air-to-ground (ATG) propagation models are both resilient and scalable and may use a wide range of link budget, grade of service (GoS), and quality of service (QoS) parameters to optimise their performance and in turn the effectiveness of the physical model. The prediction results of a simulated deployment of such a physical model and the evolved propagation model in an ad hoc network offers much promise in restoring communication links during emergency relief operations.
APA, Harvard, Vancouver, ISO, and other styles
30

Nazarov, Alexey N. "Processing streams in a monitoring cloud cluster." Russian Technological Journal 7, no. 6 (January 10, 2020): 56–67. http://dx.doi.org/10.32362/2500-316x-2019-7-6-56-67.

Full text
Abstract:
The creation of monitoring clusters based on cloud computing technologies is a promising direction for the development of systems for continuous monitoring of objects for various purposes in the web space. Hadoop web-programming environment is the technological basis for the development of algorithmic and software solutions for the synthesis of monitoring clusters, including information security and information counteraction systems. The International Telecommunication Union’ (ITU) recommendations Y. 3510 present the requirements for cloud infrastructure that require monitoring the performance of deployed applications based on the collection of real-world statistics. Often, computing resources of monitoring clusters of cloud data centers are allocated for continuous parallel processing of high-speed streaming data, which imposes new requirements to monitoring technologies, necessitating the creation and research of new models of parallel computing. The need to use service monitoring plays an important role in the cloud computing industry, especially for SLA/QoS assessment, as the application or service may experience problems even if the virtual machines on which the work is taking place appear to be operational. This requires to study the methodological possibilities of organization to study of parallel processing high-speed streaming services with the processing of huge amounts of bit data, and, simultaneously, to estimate the necessary computational resource. In the conditions of high dynamics of changes in the bit rate of information generation from the source, a model of the bit rate of Discretized Stream (DStream) formation is proposed, which has a common application. Based on the poly-burst nature of the bit rate model, a model of group content traffic of any sources of different services processed in the cloud cluster was created. The obtained results made it possible to develop mathematical models of parallel DStreams from sources processed in a cloud cluster via Hadoop technology using the micro-batch architecture of the Spark Streaming module. These models take into account the flow of requests for maintenance from sources of different services, on the one hand, and, on the other hand, the needs of services in bit rate, taking into account the multichannel traffic of sources of various services. At the same time, analytical relations are obtained to calculate the required performance of the Hadoop cluster at a given value of the probability of batch loss.
APA, Harvard, Vancouver, ISO, and other styles
31

LUKICHEVA, Vera L., Andrey A. PRIVALOV, and Daniil D. TITOV. "A model of the process of package delivering over a data transmission channel in the context of computer attacks by an intruder." Proceedings of Petersburg Transport University 2021, no. 2 (June 2021): 229–41. http://dx.doi.org/10.20295/1815-588x-2021-2-229-241.

Full text
Abstract:
Objective: To analyze the impact of computer attacks on the performance quality of data transmission channels and channeling systems. It is also necessary to take into account the capabilities of an intruder to introduce malware into channeling systems when committing a computer attack. Methods: To determine the required design ratios, several options for setting various distribution functions characterizing the parameters used as input data and types of inbound streams have been considered, taking into account the parameters of the intruder’s computer attack model set by the values of the probability of successful attack. Mathematical modeling is carried out using the method of topological transformation of stochastic networks. The exponential, momentum and gamma distributions are considered as distribution functions of random variables. The solutions are presented for inbound streams corresponding to the Poisson, Weibull, and Pareto models. Results: The proposed approach makes it possible to assess the performance quality of data transmission channels in the context of computer attacks. These assessments make it possible to analyze the state and develop guidelines for improving the performance quality of communication channels against the destructive information impact of the intruder. Various variants of the functions of random variables distribution and various types of the inbound stream were used for modeling, making it possible to compare them, as well as to assess the possibility of using them in channels that provide users with different services. Practical importance: The modeling results can be used to build communication management decision support systems, as well as to detect attempts of unauthorized access to the telecommunications resource of transportation management systems. The proposed approach can be applied in the development of threat models to describe the capabilities of the intruder (the ‘Intruder Model’).
APA, Harvard, Vancouver, ISO, and other styles
32

Bissell, Chris. "Not just Norbert." Kybernetes 39, no. 4 (May 4, 2010): 496–509. http://dx.doi.org/10.1108/03684921011036754.

Full text
Abstract:
PurposeAlthough Norbert Wiener is justifiably granted the epithet “father of cybernetics”, a number of other engineers from a control or telecommunications background also turned to areas that can broadly be categorised as cybernetic during and immediately after WW2. The purpose of this paper is to give an overview of some of these lesser‐known technologist contributors to the emerging ideas of cybernetics.Design/methodology/approachThe paper is based on primary and secondary literature, as well as two interviews from the early 1990s.FindingsIn Germany, Hermann Schmidt, Chair of the Verein Deutscher Ingenieure (Society of German Engineers) committee on control engineering (established in 1939) gave a talk on control engineering and its relationship with economics, social sciences and cultural aspects as early as October 1940. Winfried Oppelt, another member of the committee, also researched non‐technological applications of control ideas in his subsequent career (economics, biology), as did the communications engineer Karl Küpfmüller (pharmacokinetics, models of the human nervous system). In the UK, Arnold Tustin developed a mathematical model of a human gun operator during the war, and then applied control ideas to economic systems from the mid‐1940s.Originality/valueThe material presented here is not well‐known even within the control and communications engineering sectors, and is largely absent from histories of cybernetics – at least those in the English language.
APA, Harvard, Vancouver, ISO, and other styles
33

Abdellah, Ali R., Abdullah Alshahrani, Ammar Muthanna, and Andrey Koucheryavy. "Performance Estimation in V2X Networks Using Deep Learning-Based M-Estimator Loss Functions in the Presence of Outliers." Symmetry 13, no. 11 (November 19, 2021): 2207. http://dx.doi.org/10.3390/sym13112207.

Full text
Abstract:
Recently, 5G networks have emerged as a new technology that can control the advancement of telecommunication networks and transportation systems. Furthermore, 5G networks provide better network performance while reducing network traffic and complexity compared to current networks. Machine-learning techniques (ML) will help symmetric IoT applications become a significant new data source in the future. Symmetry is a widely studied pattern in various research areas, especially in wireless network traffic. The study of symmetric and asymmetric faults and outliers (anomalies) in network traffic is an important topic. Nowadays, deep learning (DL) is an advanced approach in challenging wireless networks such as network management and optimization, anomaly detection, predictive analysis, lifetime value prediction, etc. However, its performance depends on the efficiency of training samples. DL is designed to work with large datasets and uses complex algorithms to train the model. The occurrence of outliers in the raw data reduces the reliability of the training models. In this paper, the performance of Vehicle-to-Everything (V2X) traffic was estimated using the DL algorithm. A set of robust statistical estimators, called M-estimators, have been proposed as robust loss functions as an alternative to the traditional MSE loss function, to improve the training process and robustize DL in the presence of outliers. We demonstrate their robustness in the presence of outliers on V2X traffic datasets.
APA, Harvard, Vancouver, ISO, and other styles
34

Maharramov, Zakir, Vugar Abdullayev, and Tamilla Mammadova. "MODELLING SELF-SIMILAR TRAFFIC OF MULTISERVICE NETWORKS." EUREKA: Physics and Engineering 1 (January 31, 2019): 46–54. http://dx.doi.org/10.21303/2461-4262.2019.00841.

Full text
Abstract:
Simulation modelling is carried out, which allows adequate describing the traffic of multiservice networks with the commutation of packets with the characteristic of burstiness. One of the most effective methods for studying the traffic of telecommunications systems is computer simulation modelling. By using the theory of queuing systems (QS), computer simulation modelling of packet flows (traffic) in modern multi-service networks is performed as a random self-similar process. Distribution laws such as exponential, Poisson and normal-logarithmic distributions, Pareto and Weibull distributions have been considered. The distribution of time intervals between arrivals of packages and the service duration of service of packages at different system loads has been studied. The research results show that the distribution function of time intervals between packet arrivals and the service duration of packages is in good agreement with the Pareto and Weibull distributions, but in most cases the Pareto distribution prevails. The queuing systems with the queues M/Pa/1 and Pa/M/1 has been studied, and the fractality of the intervals of requests arriving have been compared by the properties of the estimates of the system load and the service duration. It has been found out that in the system Pa/M/1, with the parameter of the form a> 2, the fractality of the intervals of requests arriving does not affect the average waiting time and load factor. However, when 𝑎≤2, as in the M/Pa/1 system, both considered statistical estimates differ. The application of adequate mathematical models of traffic allows to correctly assess the characteristics of the quality of service (QoS) of the network.
APA, Harvard, Vancouver, ISO, and other styles
35

Stepanov, Sergey, and Mikhail Stepanov. "Estimation of the Performance Measures of a Group of Servers Taking into Account Blocking and Call Repetition before and after Server Occupation." Mathematics 9, no. 21 (November 5, 2021): 2811. http://dx.doi.org/10.3390/math9212811.

Full text
Abstract:
The model of a fully available group of servers with a Poisson flow of primary calls and the possibility of losses before and after occupying a free server is considered. Additionally, a call can leave the system because of the aging of transmitted information. After each loss, there is some probability that a customer repeats the call. Such models are seen in the modeling of various telecommunication systems such as emergency information services, call and contact centers, access nodes, etc., functioning in overloading situations. The stationary behavior of the system is described by the infinite-state Markov process. It is shown that stationary characteristics of the model can be calculated with the help of an auxiliary model of the same class but without call repetitions due to losses occurring before and after the occupation of a free server and the aging of transmitted information. The performance measurements of the auxiliary model are calculated by solving a system of state equations using a recursive algorithm based on the concept of the truncation of the used state space. This approach allows significant savings of computer resources to be made by ignoring highly unlikely states in the process of calculation. The error caused by truncation is estimated. The presented numerical examples illustrate the use of the model for the elimination of the negative effects of emergency information service overload based on the filtering of the input flow of calls.
APA, Harvard, Vancouver, ISO, and other styles
36

Skulysh, Mariia, José Luis Pastrana Brincones, and Dmytro Parhomenko. "DEVELOPMENT OF THE CONCEPT FOR THE COMPUTATIONAL RESOURCES MANAGEMENT SOFTWARE IN THE CUSTOMER SERVICE SYSTEMS." Information and Telecommunication Sciences, no. 2 (December 19, 2022): 26–33. http://dx.doi.org/10.20535/2411-2976.22022.26-33.

Full text
Abstract:
Background. To date, there is no customer service system that does not involve information and computer systems. One of the most important issues in ensuring the reliability and reliability of such systems is the task of dynamic scaling and providing the required amount of computing resources at any time. This study was focused on the planning and deployment of computing infrastructure that is able to respond to significantly increased volumes of request flows, changes in the dynamics of load intensity, strict requirements for the quality of their service, etc. Objective. The purpose of the paper is to create a concept of virtual computing space to meet the needs of distributed customer service system, which takes into account the peculiarities of service, the computing node load nature, service quality requirements, and provides energy efficient. Developed models, methods will control the performance of distributed computing infrastructure and flow maintenance processes, reduce downtime of computing resources and provide services to end users at a given level of quality. Methods. Analysis of the operation of the node load assessment mechanism, which consists in a dynamic change in the intensity of control of the state of function nodes, showed the effectiveness of planning for a group of computing nodes.. Results. The proposed approach to managing a heterogeneous computation environment to improve the efficiency of the service maintenance process in new generation systems is a unified solution for highly loaded distributed systems. The developed concept made it possible to avoid a decrease in the quality of service during surges of congestion and to maintain the indicators of the quality of service at a given level, provided that the resource utilization ratio is kept within the given limits Conclusions. In summary, a mathematical model of the problem of determining the maximum allowable load volume with a QoS level guarantee for a service node in a heterogeneous telecommunications environment was proposed.
APA, Harvard, Vancouver, ISO, and other styles
37

Santos, Guto Leoni, Patricia Takako Endo, Djamel Sadok, and Judith Kelner. "When 5G Meets Deep Learning: A Systematic Review." Algorithms 13, no. 9 (August 25, 2020): 208. http://dx.doi.org/10.3390/a13090208.

Full text
Abstract:
This last decade, the amount of data exchanged on the Internet increased by over a staggering factor of 100, and is expected to exceed well over the 500 exabytes by 2020. This phenomenon is mainly due to the evolution of high-speed broadband Internet and, more specifically, the popularization and wide spread use of smartphones and associated accessible data plans. Although 4G with its long-term evolution (LTE) technology is seen as a mature technology, there is continual improvement to its radio technology and architecture such as in the scope of the LTE Advanced standard, a major enhancement of LTE. However, for the long run, the next generation of telecommunication (5G) is considered and is gaining considerable momentum from both industry and researchers. In addition, with the deployment of the Internet of Things (IoT) applications, smart cities, vehicular networks, e-health systems, and Industry 4.0, a new plethora of 5G services has emerged with very diverging and technologically challenging design requirements. These include high mobile data volume per area, high number of devices connected per area, high data rates, longer battery life for low-power devices, and reduced end-to-end latency. Several technologies are being developed to meet these new requirements, and each of these technologies brings its own design issues and challenges. In this context, deep learning models could be seen as one of the main tools that can be used to process monitoring data and automate decisions. As these models are able to extract relevant features from raw data (images, texts, and other types of unstructured data), the integration between 5G and DL looks promising and one that requires exploring. As main contribution, this paper presents a systematic review about how DL is being applied to solve some 5G issues. Differently from the current literature, we examine data from the last decade and the works that address diverse 5G specific problems, such as physical medium state estimation, network traffic prediction, user device location prediction, self network management, among others. We also discuss the main research challenges when using deep learning models in 5G scenarios and identify several issues that deserve further consideration.
APA, Harvard, Vancouver, ISO, and other styles
38

Dzalilov, Zari, and Iradj Ouveysi. "Mathematical models for failure reconfiguration of telecommunication networks: Part 1." Optimization 58, no. 5 (July 2009): 483–504. http://dx.doi.org/10.1080/02331930902928112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dzalilov, Zari, and Iradj Ouveysi. "Mathematical models for failure reconfiguration of telecommunication networks: Part 2." Optimization 58, no. 5 (July 2009): 505–20. http://dx.doi.org/10.1080/02331930902928153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Vishnevsky, Vladimir, and Olga Semenova. "Polling Systems and Their Application to Telecommunication Networks." Mathematics 9, no. 2 (January 7, 2021): 117. http://dx.doi.org/10.3390/math9020117.

Full text
Abstract:
The paper presents a review of papers on stochastic polling systems published in 2007–2020. Due to the applicability of stochastic polling models, the researchers face new and more complicated polling models. Stochastic polling models are effectively used for performance evaluation, design and optimization of telecommunication systems and networks, transport systems and road management systems, traffic, production systems and inventory management systems. In the review, we separately discuss the results for two-queue systems as a special case of polling systems. Then we discuss new and already known methods for polling system analysis including the mean value analysis and its application to systems with heavy load to approximate the performance characteristics. We also present the results concerning the specifics in polling models: a polling order, service disciplines, methods to queue or to group arriving customers, and a feedback in polling systems. The new direction in the polling system models is an investigation of how the customer service order within a queue affects the performance characteristics. The results on polling systems with correlated arrivals (MAP, BMAP, and the group Poisson arrivals simultaneously to all queues) are also considered. We briefly discuss the results on multi-server, non-discrete polling systems and application of polling models in various fields.
APA, Harvard, Vancouver, ISO, and other styles
41

Obaidat, M. S. "Performance evaluation of telecommunication systems: models, issues and applications." Computer Communications 24, no. 9 (May 2001): 753–56. http://dx.doi.org/10.1016/s0140-3664(00)00348-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

SUKONSCHIKOV, ALEXEY A., ANATOLY N. SHVETSOV, IGOR A. ANDRIANOV, and DMITRIY V. KOCHKIN. "PRINCIPLES OF BUILDING SELF-ORGANIZING INFORMATION AND TELECOMMUNICATION SYSTEMS." Cherepovets State University Bulletin 1, no. 100 (2021): 56–67. http://dx.doi.org/10.23859/1994-0637-2021-1-100-4.

Full text
Abstract:
The article discusses the basic foundations of the functioning and evolution of complex distributed information and telecommunication systems (ITS) in the neuro-fuzzy agent-based paradigm. The formalization principles for such systemsareproposed:goal structuring, agent orientation, hierarchical intellectual organization, modularity of intelligent agents, structural and functional flexibility of intelligent agents, single mathematical apparatus, self-development and system evolution.The concept of a distributed intelligent ITS as a geographically distributed multi-level hierarchical set of hardware and software controlled by agent-based systems is introduced.
APA, Harvard, Vancouver, ISO, and other styles
43

Toxirjonovich, Orinov Nodirbek, and Mirzaaxmedov Muhammadbobur Karimberdiyevich. "Mathematical models of technical systems." ACADEMICIA: An International Multidisciplinary Research Journal 10, no. 11 (2020): 221–25. http://dx.doi.org/10.5958/2249-7137.2020.01343.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Calderale, P. M., and G. Scelfo. "Mathematical Models of Musculoskeletal Systems." Engineering in Medicine 16, no. 3 (July 1987): 131–46. http://dx.doi.org/10.1243/emed_jour_1987_016_032_02.

Full text
Abstract:
An understanding of the forces which act in the musculo-skeletal system is required in a number of applications. This study provides a critical and comparative discussion of the methods used to determine the muscle and joint forces, and presents an analysis of future prospects for applying these methods.
APA, Harvard, Vancouver, ISO, and other styles
45

Morris, Richard W. "Mathematical models of biological systems." Reproductive Toxicology 3, no. 2 (January 1989): 79. http://dx.doi.org/10.1016/0890-6238(89)90041-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Divakaran, J., Somashekhar Malipatil, Tareeq Zaid, M. Pushpalatha, Vilaskumar Patil, C. Arvind, T. Joby Titus, et al. "Technical Study on 5G Using Soft Computing Methods." Scientific Programming 2022 (January 7, 2022): 1–7. http://dx.doi.org/10.1155/2022/1570604.

Full text
Abstract:
With increasing advancements in the field of telecommunication, the attainment of a higher data transfer rate is essentially a greater need to meet high-performance communication. The exploitation of the fuzzy system in the wireless telecommunication systems, especially in Fifth Generation Mobile Networks (or) 5G networks is a vital paradigm in telecommunication markets. A comprehensive survey is dealt in the paper, where it initially reviews the basic understanding of fuzzy systems over 5G telecommunication. The literature studies are collected from various repositories that include reference materials, Internet, and other books. The collection of articles is based on empirical or evidence-based from various peer-reviewed journals, conference proceedings, dissertations, and theses. Most of the existing soft computing models are streamlined to certain applications of 5G networking. Firstly, it is hence essential to provide the readers to find research gaps and new innovative models on wide varied applications of 5G. Secondly, it deals with the scenarios in which the fuzzy systems are developed under the 5G platform. Thirdly, it discusses the applicability of fuzzy logic systems on various 5G telecommunication applications. Finally, the paper derives the conclusions associated with various studies on the fuzzy systems that have been utilized for the improvement of 5G telecommunication systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Косенко, Віктор Васильович, and Дмитро Миколаевич Бугас. "Mathematical models for the parameters of data flows in information and telecommunication networks." Eastern-European Journal of Enterprise Technologies 5, no. 4(77) (October 23, 2015): 37. http://dx.doi.org/10.15587/1729-4061.2015.51395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Suzuki, Takashi. "Mathematical models of tumor growth systems." Mathematica Bohemica 137, no. 2 (2012): 201–18. http://dx.doi.org/10.21136/mb.2012.142866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

NAUROSCHAT, J., and U. AN DER HEIDEN. "NONLINEAR MATHEMATICAL MODELS OF HORMONAL SYSTEMS." Journal of Biological Systems 03, no. 03 (September 1995): 719–30. http://dx.doi.org/10.1142/s0218339095000666.

Full text
Abstract:
The paper considers various approaches to mathematical modelling of endocrine systems. The functional and operational complexity of hormonal activities turns out to be the result of the cooperation of three factors: global feedback structures on the level of glands, subtle feedback and regulatory mechanisms on the level of single cells and molecules (including messengers, receptors and functional proteins like G-proteins) and finally, coupling to other organs (predominantly to the brain, e.g. via hypothalamus). To date, it is practically impossible to construct a mathematical model comprising together all these aspects. The paper aims at providing some major building bricks to such an endeavor. In the first part we summarize some of our recent models on the gobal structure of hormonal systems, in the form of nonlinear differential equations containing delay terms; oscillatory input from the brain is taken into account. Solutions of the equations display nearly all kinds of dynamical behaviour as stable limit cycles, phase locking, quasi-periodic and chaotic motions. Special emphasis is put on developing a mathematical model for the fine-tuned sequence of hormone-induced transmembrane signalling, where agonist couples to some cellular effector via transfer-proteins — this principle is widely spread among the hormone-targeted cells and crucially involved in regulating cells' behaviour towards external stimuli, e.g. their ability to desensitize as a reaction to sustained hormonal input.
APA, Harvard, Vancouver, ISO, and other styles
50

Stelling, Jörg. "Mathematical models in microbial systems biology." Current Opinion in Microbiology 7, no. 5 (October 2004): 513–18. http://dx.doi.org/10.1016/j.mib.2004.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography