Development of a mathematical model of radio resource management of special purpose radio communication systems based on an evolutionary approach
- 1. Central Scientific Research Institute of Armament and Military Equipment of the Armed Forces of Ukraine
- 2. Odessa Military Academy
- 3. Kharkiv National Automobile and Highway University
- 4. Poltava State Agrarian University
- 5. The Bohdan Khmelnytsky National University of Cherkasy
Description
The object of research is a special-purpose radio communication system. A special purpose radio communication system is affected by many different destructive influences. The main ones are deliberate interference and cybernetic impact of various purposes. The above causes the search for new scientific approaches to identify and identify the destructive impact on special-purpose radio communications in order to increase the operational efficiency of special-purpose radio communications systems. In this work, the problems of developing a mathematical model for managing the radio resource of special-purpose radio communication systems based on the evolutionary approach are solved.
In the course of the research, the authors of the work used the main provisions of the theory of artificial intelligence, the theory of automation, the theory of complex technical systems, as well as general scientific methods of cognition, namely analysis and synthesis. The proposed methodological approach was developed taking into account the practical experience of the authors of this work during military conflicts of the last decade.
The research results will be useful for:
– development of new radio resource management algorithms;
– substantiation of recommendations for improving the efficiency of radio resource operational management;
– analysis of the radio-electronic situation during the conduct of hostilities (operations);
– when creating promising technologies for increasing the efficiency of radio resource operational management;
– assessment of the adequacy, reliability, sensitivity of the scientific and methodological apparatus for the operational management of the radio resource;
– development of new and improvement of existing radio resource management models.
Directions for further research will be aimed at developing a methodology for intelligent control of the radio resource of special-purpose radio communication systems.
Files
Development of a mathematical model of radio resource management of special purpose radio communication systems based on an evolutionary approach.pdf
Files
(168.9 kB)
Name | Size | Download all |
---|---|---|
md5:f6ce3d4c230c91e3f7d5cfe6e9cb7d2b
|
168.9 kB | Preview Download |
Additional details
References
- Shyshatskyi, A. V., Bashkyrov, O. M., Kostyna, O. M. (2015). Rozvytok intehrovanykh system zviazku ta peredachi danykh dlia potreb Zbroinykh Syl. Ozbroiennia ta viiskova tekhnika, 1 (5), 35–39.
- Tymchuk, S. (2017). Methods of Complex Data Processing from Technical Means of Monitoring. Path of Science, 3 (3), 4.1–4.9. doi: http://doi.org/10.22178/pos.20-4
- Romanenko, І. О., Shyshatskyi, A. V., Zhyvotovskyi, R. M., Petruk, S. M. (2017). The concept of the organization of interaction of elements of military radio communication systems. Science and Technology of the Air Force of the Armed Forces of Ukraine, 1, 97–100.
- Shevchenko, D. (2020). The set of indicators of the cyber security system in information and telecommunication networks of the Armed Forces of Ukraine. Modern Information Technologies in the Sphere of Security and Defence, 38 (2), 57‒62. doi: http://doi.org/10.33099/2311-7249/2020-38-2-57-62
- Makarenko, S. I. (2017). Prospects and Problems of Development of Communication Networks of Special Purpose. Systems of Control, Communication and Security, 2, 18–68. Available at: http://sccs.intelgr.com/archive/2017-02/02-Makarenko.pdf
- Dudnyk, V., Sinenko, Y., Matsyk, M., Demchenko, Y., Zhyvotovskyi, R., Repilo, I. et. al. (2020). Development of a method for training artificial neural networks for intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 3 (2 (105)), 37–47. doi: http://doi.org/10.15587/1729-4061.2020.203301
- Brownlee, J. (2011). Clever algorithms: nature-inspired programming recipes. LuLu, 441.
- Gorokhovatsky, V., Stiahlyk, N., Tsarevska, V. (2021). Combination method of accelerated metric data search in image classification problems. Advanced Information Systems, 5 (3), 5–12. doi: http://doi.org/10.20998/2522-9052.2021.3.01
- Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: http://doi.org/10.20998/2522-9052.2020.2.05
- Dasgupta, D., Nino, F. (2008). Immunological computation: theory and applications. CRC press, 277. doi: http://doi.org/10.1201/9781420065466
- Celada, F., Seiden, P. E. (1992). A computer model of cellular interactions in the immune system. Immunology Today, 13 (2), 56–62. doi: http://doi.org/10.1016/0167-5699(92)90135-t
- Chan-Tin, E., Heorhiadi, V., Hopper, N., Kim, Y. (2011). The frog-boiling attack: Limitations of secure network coordinate systems. ACM Transactions on Information and System Security, 14 (3), 1–23. doi: http://doi.org/10.1145/2043621.2043627
- Hofmeyr, S. A., Forrest, S. (2000). Architecture for an Artificial Immune System. Evolutionary Computation, 8 (4), 443–473. doi: http://doi.org/10.1162/106365600568257
- Kim, S. S., Reddy, A. L. N. (2008). Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data. IEEE/ACM Transactions on Networking, 16 (3), 562–575. doi: http://doi.org/10.1109/tnet.2007.902685
- Barford, P., Kline, J., Plonka, D., Ron, A. (2002). A signal analysis of network traffic anomalies. Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurment – IMW '02, 71–82. doi: http://doi.org/10.1145/637201.637210