Krasnodar Military Institute. SM Shtemenko
Author list of organization
List of articles written by the authors of the organization
-
Description
The goal of the study is to research experimentally a pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a specially developed computer model of algorithm in Simulink. The achieved results have shown high efficiency of the considered acquisition method in contrast to sequential search method. The proposed algorithm can be used in multicarrier systems for acquisition of aperiodic pseudo-noise sequences in wireless public networks and in military communication networks
-
Description
The goal of the study is to research time characteristics of pseudo-noise sequence acquisition method for multicarrier communication systems of MC-DSCDMA, that allows low hardware requirements and able to operate in low quality channels. The way of achieving this lies in using a mathematical model of algorithm. The achieved results show suitability of MC-DS-CDMA-signals optimization for pseudo-noise sequence acquisition efficiency increase. The achieved results can be applied in MC-DS-CDMA communication systems development
-
QUANTUM DISTRIBUTION SYSTEMS: PHYSICAL BASES, PROTOCOLS, OPPORTUNITIES OF THEIR IMPLEMENTATION
Description
The aim of the article is to analyze existing quantum distribution systems, their facilities, physical bases of quantum objects behavior used in quantum distribution systems and protocols of quantum keys distribution
-
Description
The technique relates to the area of distribution of key information in cryptographic communication systems. The purpose of the work was to solve the problem of increasing the speed of distribution of key information for special bodies of federal bodies of critical facilities in the conditions of network-centric management and creating alternative options for the distribution of key information when key documents are compromised to special equipment. By applying the methodology, a solution to this problem is achieved by applying a key distribution method based on asymmetric cryptography using symmetric polynomials
-
MODELLING OF OPTICAL PULSE SIGNALS IN QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEMS
Description
It is necessary to know exact value of the full dispersion of waveguides, which leads to broadening and reduction of pulse amplitude for modeling laser radiation passage in quantum cryptography systems. The operation purpose was obtaining of dependences on a wavelength of various dispersion types according to the Sellmeier’ sequationand optical pulse radiation modelling in quantum communication systems. Dependences of the material, waveguide and chromatic dispersions on length of a wave according to the Sellmeier’s equation which allows to consider an optical fiber’s material are received. Distribution of a cryptographic impulse through fiber-optical communication lines of various extent is simulated
-
Description
In clause the main rules of the theory of modular-cluster networks are opened. The methods of the theory allow effectively to troubleshoot of dynamic simulation of complex information systems at solution of the class of the tasks coupled to the analysis of functional - structural properties of the information architecture.
-
NOISE-IMMUNITY OF PSEUDO-NOISE SEQUENCE ACQUISITION ALGORITHM FOR MC-CDMA COMMUNICATION SYSTEMS
Description
The goal of the study is to research a noise-immunity of pseudo-noise sequence acquisition method for multicarrier communication systems MC-CDMA, using a segment of the pseudo-noise sequence. The goal was achieved by running a simulation developed in MATLAB. By analyzing the results, we can show that the developed mathematical model produces the lower bound for pseudo-noise sequence acquisition probability. The resulting analytical estimations might be used during the design phrase for pseudo-noise sequence acquisition systems for MC-CDMA based military communication networks
-
DESING OF AUTOMATED SYSTEMS IN SECURED EXECUTION OF MILITARY USE
Description
In the work we have developed a structural modeling of the optimal choice of information security devices in the design of automated systems in the protected execution in the transition to network centric methods of control of troops and weapons
-
DEVELOPING A COUNTERMEASURES TO USING COVERT CHANNELS IN PACKET-SWITCHED NETWORKS
Description
In the given article a model which allows defining general characteristics of covert channels in packet-switched networks as well as countermeasures to covert channels developed on the basis of the model in question are presented
-
Description