Krasnodar high military academy
Author list of organization
List of articles written by the authors of the organization
-
05.13.19 Methods and systems of information protection, information security
DescriptionThe purpose of this work is to study the effect of clock synchronization of reference generators of special communication systems on the retention of the frame synchronization of PSP sensors when switching them to the deceleration mode, as well as short interruptions in operation, for example, when power surges, etc. in terms of electronic suppression
-
MATHEMATICAL MODELING OF PSP SENSOR SYNCHRONIZATION ON LOW QUALITY CHANNELS
05.13.19 Methods and systems of information protection, information security
DescriptionThe purpose of this work is to find the boundary estimate of the synchronization of PSP sensors in low-quality channels according to the method of the test segment (OST), independent of the distribution of errors in the channel
-
MATHEMATICAL ESTIMATION OF THE PROBABILITY OF SYNCHRONIZATION OF THE PSP AT RIGID TIME LIMITATIONS
05.13.19 Methods and systems of information protection, information security
DescriptionThe purpose of this work is to estimate the probability of synchronization of the memory bandwidth during the initial synchronization occurrence in REB conditions, due to the time interval when the attacker did not begin to interfere
-
MODELLING OF OPTICAL PULSE SIGNALS IN QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEMS
DescriptionIt is necessary to know exact value of the full dispersion of waveguides, which leads to broadening and reduction of pulse amplitude for modeling laser radiation passage in quantum cryptography systems. The operation purpose was obtaining of dependences on a wavelength of various dispersion types according to the Sellmeier’ sequationand optical pulse radiation modelling in quantum communication systems. Dependences of the material, waveguide and chromatic dispersions on length of a wave according to the Sellmeier’s equation which allows to consider an optical fiber’s material are received. Distribution of a cryptographic impulse through fiber-optical communication lines of various extent is simulated