+7 (495) 957-77-43

Content №6-2012

Methods of spectrum refarming and reallocation

 

V.E. Veerpalu, PhD, Research and technology center for analysis of electromagnetic compatibility (EMC Analysis RTC) Radio research & Development institute, veerpalu@niir.ru

 

Abstract
Article describes specrum management issues, namely methods of spectrum refarming and conversion. It outlines main characteristics of spectrum refarming and conversion processes, specifies relationship and difference between terms refarming and conversion. Article describes ways of extension of spectrum usage due to specrum refarming. There are examples of spectrum refarming and conversion for new technologies development in foreign countries. It gives an overview of main stages of the refarming procedure as an algorithm of measures to be taken for refarming. There are organizational and methodological issues of refarming implementation in Russian Federation described. Article considers main methods of solving conversion issue. It gives advantages and disadvantages of the described methods of conversion. There is a list of organizational and technological measures for conversion divided into general and local. Due to technical complexity of implementing conversion measures and minimizing financial costs there are three methods describing implementation order proposed.

 

Keywords: management, refarming, reallocation, frequency spectrum, methods, arrangements, costs.

 

References
1. Recommendation MSE-R SM. 1265. Alternative methods of frequency allocation.

2. Report ECC Report 16. The role of replanning and secondary spectrum trading in the developing world of telecommunications, 2002.

3. Recommendation ITU-R SM. Spectrum redeployment as a method of national spectrum management. Doc. 1B/TEMP/7, 2001.

4. The federal law “On communication” from 07.07.2003 № 126-FZ.

5. Table of Frequency Allocations between radio services of the Russian Federation. Decree of the Russian Federation of July 15, 2006, No 439-23.


Analysis of profilessubscriberInternet traffic

 

Erohin S.D., MTUCI

 

Abstract
On the basis of the obtained statistical data offered four typical profile of user traffic. Formulated the main factors affecting the profile of the user traffic. Shows the features of the modern Internet traffic and tendencies of development of its characteristics. Offered variants of optimization and compression of Internet traffic with the use of profile information traffic.

 

Keywords: TCP, UPD, Internet, traffic profiles, application protocols.

 

References
1. А.V.Testov, Traffic profile of the Moscow broadband access: anomalies and problems // catalogue “Broadband multiservice networks”, Groteck, 2009.

2. Traffic and market data report // Ericsson 2011.

3. www.cnews.ru/news/line/index.shtml?2011/10/19/460950.

4. www.comnews.ru/node/61707.


RESEARCH OF ROUTING PROTOCOLS IN NONGEOSTATIONARY SATELLITE SYSTEMS

 

Ivanov Valeriy, Postgraduate student, Radiotechnical Systems Department, Moscow Technical University of Communications and Informatics, ivanovvi@ieee.org

 

Abstract
Article presents analysis of routing protocols and key technical issues in nongeostationary satellite systems. Routing protocols were systematized. The issue of QoS routing, dynamic topology, subscriber mobility, terrain influence on elevation mask and handover strategies were studied.

 

Keywords: NGEO satellite systems, routing, dynamic topology, elevation mask, handover.

 

References
1. Volkov L.N., Nemirovsky N.S., Shinakov Yu.S. Digital radio. M. Ekotrendz, 2005. Pp. 374-376.

2. satellitemarkets.com.

3. TannenbaumA. Computer networks. Peter, 2003. Pp. 520-523.

4. Alagoz F. et al. Exploring The Routing Strategies In Next-Generation Satellite Networks — IEEE Wireless Communications, June 2007.

5. Sun J., Modiano E. Routing Strategies for Maximizing Throughput in LEO Satellite Networks — IEEE Journal On Selected Areas In Communications, Vol. 22, No. 2, February 2004.

6. Jiang W., Zong P. QoS Routing Algorithm Based on Traffic Classification in LEO Satellite Networks — IEEE Wireless Communications, June 2011.

7. Karapantazis S., Papapetrou E., Pavlidou F. Multiservice On-Demand Routing in LEO Satellite Networks — IEEE transactionas on wireless communications, vol.8, no.1, January 2009.

8. Zhang X., Ding L., Rao Y. QoS Routing by Genetic Algorithm for LEO Satellite Networks — 2009 Second International Symposium on Computational Intelligence and Design.

9. Zhou Y., Sun F., Zhang B. A Hierarchical and Distributed QoS Routing Protocol for Two-layered Satellite Networks — IMACS Multiconference on “Computational Engineering in Systems Applications”(CESA), October 4-6, 2006, Beijing, China.

10. Nishiyama H., Kudoh D., Kato N., Kadowaki N. Load Balancing and QoS Provisioning Based on Congestion Prediction for GEO/LEO Hybrid Satellite Networks — Proceedings of the IEEE | Vol.99, No.11, November 2011.

11. Long F., Sun F., Wu F. A QoS Routing Based on Heuristic Algorithm for Double-Layered Satellite Networks — 2008 IEEE Congress on Evolutionary Computation (CEC 2008).

12. Tsunoda H. et al. Supporting IP/LEO Satellite Networks by Handover-Independent IP Mobility Management — IEEE JSAC, Vol. 22, no. 2, Feb. 2004.


The procedures andtime characteristics of the operational control traffic in the transport network special packet

 

Legkov K.E., North-Caucasus branch MTUCI, Ph.D., constl@mail.ru

 

Abstract
The transport network packet special urgent task of operational traffic control. To solve this problem it is necessary to conduct an informed choice requirements for the operational management of traffic, which is necessary to clarify the procedure applications MPLS. These include procedures for traffic engineering, including the mechanism of signaling and resource reservation for MPLS, virtual private networks. Detail the procedures for applications MPLS. To solve the problems of traffic engineering, MPLS technology uses extensions of routing protocols working based on the link state algorithm. Today, these extensions are standardized for OSPF and IS-IS. These protocols, in contrast to distance vector protocols, give the router a full topological information about the network. Their ads contain information about the routers and networks, and the physical connections between them. Each connection is characterized by the current health status and metrics, which is used as the inverse of the channel capacity. The first of the two functions assigned to RSVP technology MPLS, is the distribution of marks. Second, the traditional role of RSVP is to maintain the QoS in the network MPLS. In MPLS-VPN Two basic traffic flow: flow control, which includes the routing information between the PE and CE routers and between PE and the information necessary to create the LSP between routers and data flow of information users. Based on the case studies shows that a combination of technologies for VPN is effective and allows you to build a network that supports the many taken from the VPN-added services and implements quality of service based on MPLS.

 

Keywords: traffic management, resource reservation, virtual private network, the router, engineering.

 

References
1. ProcisJ. Digital communication. M.: Radio I Svyaz, 2000. 241 p.

2. Raniwala A., Gopalan K., Chiueh T. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM Mobile Computing and Communications Review, 2004, vol. 8, pp. 50-65.

3. Raniwala, A. Tzicker Chiueh. Architecture and algorithms for an IEEE 802.11_based multi-channel wireless mesh network. Proc. ofINFOCOM’05, vol. 3, pp. 2223- 2234.

4. Legkov K.E., Donchenko A.A. Analysis of the existing allocation algorithms frequency resource of wireless networks for special purposes // Proceedings of the GFR MTUCI, 2009. Rostov-on-Don: GFR MTUCI 2009. Pp. 50-52.

5. Legkov K.E., Donchenko M.A. Requirements for indicators of the quality of information exchange in wireless broadband // Proceedings of the GFR MTUCI, 2009. Rostov-on-Don: GFR MTUCI 2009. Pp. 59-64.

6. Legkov K.E. Methods for assessing the quality of information exchange in wireless broadband networks // Proceedings of the GFR MTUCI 2009. Rostov-on-Don: GFR MTUCI 2009. Pp. 64-68.


Method of predicting changes in traffic using the neural network model

 

Pokrovskay M.A., MTUCI, mari.pokrovskaya@gmail.com

 

Abstract
To ensure the effective operation of the contact-center it must have the levels of effective management of its resources. One possible solution might be the method of prediction which will allow to avoid the overload of web-server. In this paper it is offered to use the neural network model for prediction of traffic changes. For the research It is used the data of the real existing network, calculated mean-square errors and graphed the plots of one, two and three steps prediction.

 

Keywords: сontact-сenter, self-similar traffic, traffic intensity, prediction, the neural network, the test results.

 

References
1. Mandelbaum, A., Massey, W.A. and Reiman, M.I. (1998), Strong approximations for Markovian service networks,Queueing Systems: Theory and Applications (QUESTA) 30, рр. 149-201.

2. Livshits K.I.,Shiferdeker I.Yu. Diffusion approximation of the mathematical model of the non-profit foundation with the relay money management // Bulletin of the Tbilisi State University in 2006. No293. Pp. 38-44.

3. Crovella M. E., Bestavros A. Self-similarity in world wide web traffic evidence and possible causes // Proc. of the 1996 ACM SIGMETRICS: Intern. conf. on Measurement and modeling of computer systems, May, 1996 and IEEE/ACM Trans on Networking, 1997. V.5, No6. Pр. 835-846.

4. Veres A., Kenesi Zs., Molnar S., Vattay G. On the Propagation of Long-Range Dependence in the Internet // Proc. ACM SIGCOMM 2000. Stockholm, Sweden, Sep. 2000.

5. Kugiumtzis D., Boudourides М.Chaotic Analysis of Internet Ping Data: Just a Random Generator // SOEIS meeting at Bielefeld, March 27-28, 1998.

6. Foag J., Wild T. Traffic Prediction Algorithm for a Speculative Network Processor // 17th Intl. Symposium for High Performance Computing Systems and Applications HPCS 2003. Sherbrooke, May 2003.

7. Trajkovic L., Neidhardt A. Internet traffic prediction // Centre for Systems Science, Simon Fraser University, Vol. 12, Issue 1. Mar. 2000.


ANALYSIS OF CHARACTERISTICS OF DIGITAL WIRELESS CARRIERS IN THE DECAMETER WAVES

 

Uryadnikov Y.F., MTUCI

 

Abstract
The access technology based on digital carriers. Such access solves the problem of interference and speeds up the radio in the decameter range compared to conventional technologies. The evaluation of digital distortion carrier dispersion and speed radio link systems decameter range with digital carriers.

 

Keywords: radio access, access technology, digital carriers, decameter.

 

References
1. Adzhemov A.S., Uryadnikov Y.F. Broadband access technologies: Past, Present and perspective / Electrosvyaz’, No1, 2011.

2. Uryadnikov Y.F., Adzhemov A.S. Ultra wideband communications. Theory and application. M., 2005, 368 p.

3. Ivanov D.V. Methods and mathematical model studies of the ionospheric decameter complex signals and their dispersion distortion correction. — Yoshkar-Ola, 2006. 268 p.


Characteristics andprospects of development of digital TV. Broadcasting standards (Part 1)

 

Klimov D.A., Ph.D., Deputy. Head of Research Center MTUCI

 

Abstract
Today, there arethree types of digital TV standards: ATSC, DVB, ISDB. Since Russia uses standard DVB, it is precisely for this standard describes the main means of transmission of TV signal. The main transmission standards DVB – is DVB-S (S2) for satellite, DVB-C (C2) for cable and DVB-T (T2) for terrestrial broadcasting, dominant in the world and are the basis of most alternative standards. DVB uses compression technology MPEG, which saves a lot of frequency resources. Standards considered essential, sputnikovogo, cable, mobile digital television broadcasting, IPTV technology and applications television systems. The conclusions about the current trends of technology development in the field of digital television.

 

KeywordsDVB, TV signal, digital television broadcasting, IPTV.

 

References
1. ZubarevYu.B., Sagdulaev Yu.S. Trends in the development of technology and video information systems television. Part 1, 2 // Broadcasting. Television and radio, 2011. No 2, 3.

2. www.polytron_tv.ru/design/iptv.html.

3. dvbpro.ru.

4. www.telemehanik.ru/prikladnoe_televidenie.html.

5. www.broadcasting.ru/wiki/index.php?title=DVB_S.


Effects of Ad_Hoc Network Topology Parameters on Performance of Video Streaming

 

Taubin F.A., Chuikov A.V., MTUCI

 

Abstract
Video streaming in wireless environments using 802.11 ad-hoc network protocol is considered. The quality of video streaming is measured by structural symmetry (SSIM). The higher complexity of SSIM against SNR is shown. Three typical network topologies are analyzed. The first one is simplest – it includes two nodes on line of sight. The second one is static too but it includes additionally intermediated nodes and interference nodes. The third topology is dynamic and it comprises a group of randomly moving nodes. The effect of video encoding rate and network parameters (such as multi-hopping, interference, the number and velocity of intermediate nodes) on the performance transmission is analyzed via simulation. The bundle software was developed for complete cycle simulation. It bases on simulator NS-3 and consists of all parts of simulation – video encoding, RTP encapsulation, transmission simulation, video decoding and statistics gathering. The software has different options for batch mode and future research.

 

Keywords: Streaming Video, Wireless Networks, Network Topology, RTP/UDP packets, Network Simulator NS-3, structural symmetry, SSIM.

 

References
1. Cai L., Shen X., Mark J.W.Multimedia Services in Wireless Internet: Modeling and Analysis, Wiley, 2009.

2. Ramanathan R., Radi R.A Brief Overview of Ad Hoc Networks: Challenges and Directions, IEEE Communication Magazine, May 2002, pp.20- 22.

3. FFmpeg Multimedia System, ffmpeg.org/ documentation.html (дата обращения25.03.2012).

4. Request for Comments (RFC) 3550, RTP: A Transport Protocol for Real-Time Applications, July 2003.

5. Handley M., Jacobson V.Request for Comments (RFC) 2327, SDP: Session Description Protocol, April 1998.

6. Z. Wang, A. C. Bovik, H. R. Sheikh, S. Member, E. P. Simoncelli.Image quality assessment: From error visibility to structural similarity, IEEE Transactions on Image Processing, April 2004, pp. 600–612.

7. Z. Wang.Survey of objective video quality measurements. Technical Report T1A1.5, Worchester Polytechnic Institute, 2006, pp. 96-110.

8. Network Simulator 3, www.nsnam.org/docs/release/ manual.pdf (дата обращения25.03.2012).

9. Request for Comments (RFC) 3626, Optimized Link State Routing Protocol (OLSR), INRIA, October 2003.

10. ChuikovA.V. Software system to study the characteristics of video transmission over wireless networks. Moscow: RAO OFERNiO, 0206846200592-01, 2012.

11. Anastasi G., Borgia E., Conti M. and Gregory E. Wi-Fi in ad hoc mode: a measurement study, Proceeding of IEEE Int. Conf. on Pervasive Computing and Communications, March 2004, pp. 145-154.

12. ChuikovA.V. Influence of the packet size on the video transmission quality of video sequences reconstructed in wireless networks / / T-Comm – Telecommunications and Transport, 2010. No3.Pp. 32-34.


Prospects of Application of Intelligent Antenna Systems. Path of Development

 

Shchuchkin V.M., postgraduate student of Moscow Technical University of Communications and Informatics, vlad.sh86@yandex.ru

 

Abstract
This article is devoted to the development of intelligent antenna systems used in mobile networks. The author analyzes the development of the most promising algorithms using smart antenna systems and identify areas of technology management pattern. Proposed and analyzed by eliminating local overloads that result in one of the key reasons why the quality of customer service. The expediency of the use of intelligent antenna systems with tilt functionality of the antenna base stations to achieve the goals.

 

Keywords: intelligent antenna systems, radiation pattern, local congestion, the quality of service.

 

References
1. www.comba_telecom.com, www.amphenol_jaybeam.com, www.powerwave.com, www.kathrein.com, www.motorola.com, www.ericsson.com/ru, www.kentrox.com, www.aisg.org.uk, www.raycom_w.ru, www.nokiasiemensnetworks.com.

2. Shorin О.А. Methods of optimal allocation of time_frequency resource in mobile radio systems. M.: MTUСI, 2005. 351 p.

3. Shorin O.A. Tchoutchkin V.M. The use of smart antenna in mobile communication systems to reduce congestion // Proceedings of the MAI, 2012, No 53.

4. Angeliki Alexiou, Monica Navarro Robert, W. Heath Smart Antennas for Next Generation Wireless Systems: google.ru.

5. Base Station Antennas for Mobile Communication: ebookbrowse.com/katalog_790_6000_mhz_base_station_antennas_for_mobile_communications_pdf_ d361432785.

6. Power wave, Product Catalog: www.raycom_w.ru/images/stories/catalogue/ Powerwave_Product_ Catalog_2010_DD20100224.pdf.

7. Chae Y. Lee, Hyon G. Kang and Taehoon Park A Dynamic Sectorization of Microcells for Balanced Traffics in CDMA: Genetic Algorithms Approach//Basic Research Program of the Korea Science & Engineering Foundation 1999.

8. Final Report on Semi-Smart Antenna Technology Project. stakeholders.ofcom.org.uk/binaries /research/technology-research/finalb.pdf.

9. Kathrein Remote Electrical Tilt System: www.kathrein.de/en/mcs/techn_infos/download/9981081 7.pdf.


ABOUT DECOMPOSITION METHOD SPECIAL FUNCTIONS IN POWER SERIES

 

Skorodumova E.A., MTUCI

 

Abstract
The method of decomposition of special functions in power series. Consideration HN evaluation questions of computational complexity and the convergence of the algorithm. As an example of a diagram of the power series expansion of the generalized Fresnel integral.

 

Keywords: power series, special functions, generalized Fresnel integral, convergence of the algorithm.

 

References
1. Ufimtsev P. Ya. The theory of diffraction edge waves in electrodynamics. M.: BINOM. Knowledge Laboratory, 2012. 372 p.

2. Ufimtsev P. Ya. Fundamentals of the physical theory of diffraction. M. BINOM. Knowledge Laboratory, 2011. 350 p.

3. V. Kaloshin. Short_Wave Electromagnetic Asymptotics of Open Systems. Proceedings of the 12th International Conference on Mathematical Methods in Electromagnetic Theory, June 29 – July 02, 2008, Odessa, Ukraine, pp. 16-20.

4. K.B. Oldham, J.C. Myland, J. Spanier. An atlas of functions. 2nd ed. Springer, 2008. 748 p.

5. Kahaner, D., Mouler C., Nash S. Numerical methods and software. M., 2001. 575 p.


The experiences concerning action of a high alternating voltage on an aluminium needle

 

Frisk V.V., MTUCI, frisk@mail.ru

 

Abstract
In the given work some experiences showing influence of a high alternating voltage in a single-wire line on the aluminium needle. suspended on a usual thread are resulted.

 

Keywords: High voltage, single-wire line, closed circuit, broken circuit, single-wire current, aluminium needle.

 

References
1. Experimenta circa affectum conflictus electrici in acum magneticam, Hafniae, 1820 (russian translation in the book: Ampere A. M, Electrodynamics, М., 1954. Pр. 433-439).

2. Frisk V.V. Аnalysis of frequency characteristics of the unipolar voltmeter //conference Works “Telecommunication and computing systems”. M.: Incvjzizdat, 2010. Pр. 188-189.

3. Kasyanov G.T. Tesla`s single wire current, its physical properties and methods of use. The international maga_

zine applied and fundamental researches, 2010. No5. Pр. 35-40.

4. Strebkov D.S., Nekrasov A.I. Resonant methods for electric power transmission and application. M.: VIFSH, 2008. 352 p.

5. Avramenko S.V. Way of a food of electrotechnical devices and the device for its realisation//the Patent

2108649 C1 RU. The bulletin of inventions 1998. No10. Pр. 319.

6. Gerasimov S.A. The single conductor transmission of electric energy: calculation and measurements // Modern nigh technologies, 2011. Pр. 28-31.


Steganography technologies — new area of information security

 

Golubev E.A., Professor MTUCI

 

Abstract
Against the background of threats is considered a new trend of information security — an indirect steganography, its historical prototypes, communication with kleptography, post-quantum cryptography nonkryptography and approaches.

 

Keywords: technology, steganography, cryptography, information security.

 

References
1. Young A.L., Yung M.M., Kleptography: Using cryptography against cryptography || Advances in Cryptology_Evrocrypt`97, Springer — Kerlag, Lecture Notes in Computer Science No 1233, 1997

2. Young A, Yung M., Malicious cryptography exponsing cryptovirology. Wiley Publishing, Inc., 2004.

3. Post-Quantum Cryptography, Springer, 2009.

4. Archive Online IACR.

5. Ivanov M.A., Kovalev A.V., Matsuk N.A. MikhailovD.M., Gugunkov I.V. Stochastic methods and protection of information in computer systems and networks. M., 2009.

6. Simmons G.J., The prisoners problem and the subliminal channel, Proc. Workshop on Communications Security (Crypto’83), 1984, 51-67.

7. Anderson R. editor.//Proc. Jnt. Workshop on Information Hiding: Lecture Notes in Computer Science. Springer-Verlag, Cambridge, 1996.

8. Alishov N. Indirectsteganography. International Book Series “Information Science and Computing” KDS 2009, Vama, Bulgaria, 2009. Pp. 53-57.

9. Shenon C. Communication theory of secrecy system, Bell System Techn. J. 28, No4 (1949) 65-715

10. Golubev E.A., Emelyanov G.V.Steganography as one of the areas of information security. T-Comm “Information Society Technologies”. M., 2009.


Review of methods for the analysis of information security risk information system

 

V.V. Pugin, pugin@psati.ruO.Yu. Gubareva, OlgaGubareva@inbox.ru

 

Abstract
Today there is a large number of wide-spread risk analysis techniques that can be divided into a number of groups. The authors of this article suggest reviewing these techniques in detail using as an example following specific products developed by western companies. FACILITATED RISK ANALYSIS PROCESS (FRAP) technique implies qualitative risk analysis. This method evaluates the risk level of an unprotected Information System. This is later used to demonstrate the effect of implementation of an information security tool. RISKWATCH has developed proprietary quantitative method, where the level of risk is presented in the form of numbers, such as expected losses and return of investment. This method evaluates current risks and prospective gains that could be obtained after implementation of physical, technical, software and other information security tools. CRAMM applies an integrated method, using both qualitative and quantitative techniques. It is comprehensive and applicable for both large and small companies. Similar method is employed in Microsoft products. OCTAVE (OPERATIONALLYCRITICAL THREAT, ASSET, AND VULNERABILITY EVALUATION) — is a risk evaluation method that implies that the evaluation process is conducted in the company internally, without external consultants. OCTAVE provides only the estimate of the expected loss, while the probability is not evaluated. OCTAVE is a freeware product in contrast to the others.

 

Keywords: FACILITATED RISK ANALYSIS PROCESS, RISKWATCH, CRAMM, OCTAVE.

 

References
1. www.buhgalteria.ru/article/n44826.

2. Skrekhin Seregey Viktorovich. www.bytemag.ru/articles/detail.php?ID=6781.

3. security.meganet.md bre.ru/security/13985.html.

4. www.iso27000.ru/chitalnyizai/upravlenie_riskami_informacionnoi_bezopasnosti/upravlenie_riskami_obzor_upotrebitelnyh_podhodov.

5. www.peltierassociates.com.

6. www.cert.org/octave.

7. www.cramm.com.

8. www.riskwatch.com.


System of adaptation of the electric drive of vehicles For work with the account of a condition of the operator

 

Sinitsyn I.E., Ph.D, Docent RSREU department of AITP

Varnavsky A.N., Ph.D, Docent RSREU department of AITP, var_navsky_alex@rambler.ru

Korochkin E.S., post-graduat student RSREU, Ryazan, eliseysergeevich@mail.ru

 

Abstract
With asynchronous or other electric motor the system of adaptation of the electric drive Is developed for use in work taking into account a condition of the operator, the comparative analysis of some types of electric motors is carried out, the basic theoretical positions for physical processes in electric motors of system of adaptation are resulted.

 

Keywords: the asynchronous electric motor, the electric drive, safety, adaptation system, the moment, a current, a magnetic stream, the direct current electric motor.

 

References
1. Katsman M.M. Electrical Machines. M.: The Academy, 2003. 496 p.

2.Bruskin D.E. Electrical machinery and micromachines. M: High School, 1981. 482 p.

3.General Electrical: study manual for schools, edited A.T.Blazhkina. L.: Energy, 1979. 472 p.

4.Savelyev I.V. Physics course. Volume 2. M., 1978.480 p.

5.Kopylov I.P. Electrical machinery. Moscow. High School, 2006. 607 p.


Prediction popular radio stations

 

Abramov V.A., Associate Professor, MTUCI, vabramov44@mail.ru; Malov A.V., Postgraduate, MTUCI, almalov@mail.ru; Popov O.B., Professor MTUCI, olegp45@yandex.ru; Chernikov, K.A., Postgraduate, MTUCI, che_kirill @ yandex

 

Abstract
The purpose of this paper is the presentation of a new method for predicting popular radio stations. Shown that the broadcast signal (VS) contains two types of information — the semantic and emotional. Radio stations (RWS) differ significantly in average power, defined signal processing in the studio. Shown that the most popular WAN with minimal deformation of the envelope amplitude of the signal in the preparation of programs to be broadcast. Determined that the peak factor cepstral estimates Sun rises in the transmission of programs to the harmonic spectrum, and built down — disharmonious transmission signal. Signals from more colorful, exaggerated emotional coloration, have a “cool” fronts (attack) and downs. The signal of most advertising PBC typically undergoes compression amplitude with increasing steepness of attacks and recessions, increased volume, “ringing” timbre that matches the emotions of aggression. The number of attacks per unit time in the modulation signal parameters (envelope and instantaneous frequency) was convenient to identify rhythmic properties of the signal. It is shown that many of the treatments of acoustic signals based on different kinds of disguises, ie for making such a signal distortions that are beyond the threshold of their human consciousness. The proposed method compares the program of PBC based on the evaluation of the statistical properties of Sun This method can improve the quality of broadcast programs and popularity ratings PBC. The originality of the proposed method is confirmed by articles and speaking at conferences.

 

References
1. Mole A. Information theory and aesthetic perception / Per. French. – Academic Press, 1966. 351 p.
2. Morozov V.P. Computer technology and its application. M.: Znanie, 1989. No 9.

3. Popov O.B., Richter S.G. Estimation problem and maintain the quality of sound in composite paths and channels // 1st International Conference “Problems and prospects of the development of digital television and radio broadcasting in Russia. May 14-15, 2003. Moscow: JSC “Expo-Telecom.” Abstracts. Pp. 68-71.

4. Popov O.B., Richter S.G. Digital signal measurement paths in sound broadcasting. M.: Insvyazizdat, 2010. 292 p.

5. Abramov V.A., Popov O.B., Rysin Yu.S. Emotional information in the broadcast media. 20th International conference on “Modern TV and electronics.” Moscow: FSUE Bureau “Electron”, 2012. Pp. 36-42.

6. Abramov V.A., Popov O.B., Pavlov A.N. Infra-low frequency sound signals in broadcasting. International Forum of Information (MFI-2011). International Congress (CTN-2011) Communications technology and network. M.: MTUCI 2011. Pp. 200-203.

7. Abramov V.A., Popov O.B., Rysin Y.S. Background information in the broadcast media. 16th International conference on “Current TV.” Moscow: FSUE IBC “Electron”, 2008. Pp. 17-19.


Rating system of evaluation of students

 

Denisova A.B., Deputy first vice-rector on educational work, Associate professor Moscow Technical University of Communications and Informatics, den_alla@yandex.ru

 

Abstract
The new paradigm of education requires a shift from the content of education as the goal of education as a means of personal development. In the hierarchy of the tasks of higher education take a higher level tasks to solve any experts, regardless of the particular profession. These tasks are the key contents, generic competencies, and they shall make the mandatory minimum requirements of the employer to a specialist. The collective nature of most of the activities requires knowledge, skills and social-communicative nature, concerning the scope of communication and interaction between people. Without these skills can not be successful socialization of the individual and its universality, which is manifested in the ability of the different types of activities to adapt to dynamic changes in manufacturing. Universal jurisdiction formed in a certain socio_cultural environment of the university, which in turn creates a large extent due to extra-curricular and extracurricular work. Results of extracurricular activities are a comprehensive assessment of quality of education, so the development and implementation of the evaluation of the student’s educational institution is to an actual problem. The article considers the option of such a system, embedded in the educational process of the Moscow Technical University of Communications and Informatics.

 

Keywords. Extracurricular activities, rating system, monitoring, quality assurance, common statistical information system, the educational process.

 

References
1. Atanasyan S.L. Formation of information educational environment of the university teaching: summary. M., 2009. P.18.

2. Bolotov V.A. Construction of Russian system of education quality assessment // Problems of Education No1, 2005. Pр. 5-10.

3. Denisovа A.B. Social adaptation of professional technical university students in extracurricular activities and introduction to the corporate culture // Education and Society, No1 (72), 2012. Pр. 9-14.

4. Denisovа A.B. The formation and development of extracurricular activities in the Moscow Technical University of Communications and Informatics. Kazan: IPK “Exim_Press”, 2012. 132 р.

5. Krechetnikov K.G. Designing creative learning environment for information technology in the university: Yaroslavl, 2003. Р. 22.

6. Senge P. The Fiffh Disciplin C: The art and practice of the learning organization, Double-day, London, 1990. 425 p.