<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid/>
  <issn>2687-0517</issn>
  <journalInfo lang="ENG">
    <title>Computing, Telecommunication and Control</title>
  </journalInfo>
  <issue>
    <volume>14</volume>
    <number>1</number>
    <altNumber> </altNumber>
    <dateUni>2021</dateUni>
    <pages>1-70</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>7-21</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Shashikhin</surname>
              <initials>Vladimir</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Turulin </surname>
              <initials>Aleksandr </initials>
              <email>sanya.turulin.98@list.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Budnik</surname>
              <initials>Svetlana</initials>
              <email>budnik.sveta@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Image encryption algorithm based on controlled chaotic maps</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article reviews the problem of ensuring the security of storage, processing, and transmission of images based on a cryptographic method using chaotic maps. The encryption algorithm is based on a three-dimensional mapping. The encryption algorithm strength when using systems with chaotic dynamics depends on the value of the largest (positive) Lyapunov characteristic exponent. Therefore, the problem of increasing resistance to various kinds of attacks is reduced to determining the control parameters, at which the leading Lyapunov characteristic exponent increases. The authors propose a procedure for changing the chaotic map characteristics (entropy and Lyapunov characteristic exponents) based on introducing feedback into the system. The procedure is developed using the modal control method based on reducing the system to the canonical Frobenius form. The use of the proposed algorithm is considered on the example of the Rössler system. The test results confirmed an increase in the strength of the proposed encryption algorithm against statistical and differential analysis due to an increase in the Lyapunov characteristic exponent.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14101</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Image encryption</keyword>
            <keyword>chaotic maps</keyword>
            <keyword>control of the spectrum of Lyapunov characteristic exponents</keyword>
            <keyword>modal control</keyword>
            <keyword>canonical Frobenius form</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.1/</furl>
          <file/>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>22-32</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kotlyarov </surname>
              <initials>Evgeniy</initials>
              <email>ekotlyarov86@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Mikhailov </surname>
              <initials>Viktor </initials>
              <email>vmikhaylov@niime.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Zubov </surname>
              <initials>Igor </initials>
              <email>izubov@niime.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <surname>Nuikin </surname>
              <initials>Andrey </initials>
              <email>anuykin@niime.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <individInfo lang="ENG">
              <surname>Iljin </surname>
              <initials>Alexander </initials>
              <email>alexiljin0@gmail.com</email>
            </individInfo>
          </author>
          <author num="006">
            <authorCodes>
              <researcherid>P-5603-2015</researcherid>
              <scopusid>14042371400</scopusid>
              <orcid>0000-0003-0608-7824</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>National Research University of Electronic Technology</orgName>
              <surname>Putrya </surname>
              <initials>Mikhail</initials>
              <email>pmg@miee.ru</email>
              <address>Shokin Square, Bld. 1, Zelenograd, Moscow, 124498, Russia</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">CMOS inductor design features for LTE devices</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This work is devoted to some aspects of the development of planar elements of the microwave path, which are used in the design of low-noise LTE range amplifiers, namely inductors, for further employment as part of the NB-IoT transceiver. General theoretical calculations on the design of high-frequency inductors are given. By the example of a multilayer CMOS 90 nm inductor with a nominal value of 7 nH, we demonstrated the influence of the structure thickness obtained by replicating layers used to get the required skin layer thickness and to achieve the best quality factor in the LTE frequency range from 0.5 to 3.5 GHz by means of electromagnetic (EM) models. For a better understanding of the inductor operation, the models obtained as a result of the EM simulation for different values of the substrate conductivity are compared. The obtained data partially refute the need of increasing the maximum thickness of the inductors by a set of upper metals combined using multiple TSV arrays for silicon process stacks. Due to the increasing of the capacitive influence of the substrate on the lower metal layers of the inductor, the highest values of Q-factor and self-resonance frequencies are achieved by the structures with a minimum number of metal layers, despite the negative influence of the skin effect for low frequencies.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14102</doi>
          <udk>621.372</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>LTE</keyword>
            <keyword>NB-IoT</keyword>
            <keyword>inductance coil</keyword>
            <keyword>3D inductor</keyword>
            <keyword>CMOS</keyword>
            <keyword>EM analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.2/</furl>
          <file>22-32.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>33-42</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Aslanov</surname>
              <initials>Gadarbek</initials>
              <email>uits@dstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Kazibekov </surname>
              <initials>Rustam </initials>
              <email>kazibrus11@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Musaibov </surname>
              <initials>Rashid </initials>
              <email>rashid_musaibov@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Disadvantages of the instrumental error determining method of airfield quasi-Doppler automatic direction finders</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An increase in the aircraft flights intensity leads to the need to improve the efficiency of the airfield radio equipment functioning. One of the ways to improve the accuracy of navigation equipment is to reduce the instrumental error. The article analyzes the methods of checking the instrumental error of the ADF. Is shown that the so-called “electric rotation” of the antenna system (AS) head used in the radio direction finders ADF-80K, ADF-80, ADF-85, “Platan”, DF-2000 for checking the instrumental error leads to incorrect results. The authors employed the linearity property of the Fourier transform in the simulation to prove the incorrectness of the method for determining the ADF instrumental error with the “electric rotation” of the AS head. The simulation results showed that in the ADF operating in the quasi-Doppler mode, the failure of the vibrators located along the bearing line to the radio source does not lead to the appearance of bearing error, while the failure of the vibrators located orthogonally to the bearing line can result in a bearing error reaching 3.750. The simulation results confirmed that unlike the ADF that use the AS head “electric rotation”, the ADF with mechanical rotation show reliable results of the instrumental error measurement. The paper proposes a new method for checking the instrumental bearing errors using the values of the AS phase non-identities which ensures the reliability of the measurement results.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14103</doi>
          <udk>621.396</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>instrumental error</keyword>
            <keyword>aerodrome automatic direction finders</keyword>
            <keyword>phase non-identity</keyword>
            <keyword>antenna system</keyword>
            <keyword>electric rotation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.3/</furl>
          <file>33-42.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>43-49</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Vargauzin</surname>
              <initials>Viktor</initials>
              <email>var@mail.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Nikolaev </surname>
              <initials>Denis </initials>
              <email>nikolaev.d.i@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">High precision passive radar algorithm</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The work is devoted to the study of the location determination algorithm for an arbitrary number of receiving stations using the differential-rangefinder method. The algorithm uses all possible Time Differences of Arrival (TDOAs) of the signal from the radio emission source to the receiving stations. In this case, the concept of a “reference” receiving station is excluded, relative to which the range differences are estimated in the classical method, and the signal TDOAs from the source between all possible pairs of receiving stations are used. It is shown that for a given number of receiving stations, the transition from the algorithm with one “reference” station to the proposed algorithm can significantly increase the accuracy of determining the location. Moreover, with an increase in the number of receiving stations, the efficiency of such a transition increases. In addition, for both methods, it has been demonstrated that adding a new receiving station improves positioning accuracy, but the gain decreases with the increasing number of stations. The work can find application in various monitoring systems, since it can significantly increase the accuracy of location determination only through algorithmic solutions, without costly replacement of equipment.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14104</doi>
          <udk>621.396.4</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>determination of object location</keyword>
            <keyword>receiving station</keyword>
            <keyword>time difference of arrival</keyword>
            <keyword>radio emission source</keyword>
            <keyword>positioning accuracy</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.4/</furl>
          <file>43-49.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>50-59</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Cajas Guijarro </surname>
              <initials>Carlos David</initials>
              <email> cajasgcarlos@hotmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Budanov</surname>
              <initials>Dmitriy</initials>
              <email>dmitriy.budanov@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">On programming an application to mitigate DoS attack using OpenDaylight controller in software-defined networking</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Denial of Service (DoS) attacks try to deplete system resources by consuming bandwidth. In this paper the application using Software-Defined Networking (SDN) principles for DoS attack mitigation based on traffic monitoring in a network is proposed. The most important details about the programming aspects of the application using OpenDaylight (ODL) are explained. The application generates both proactive and reactive rules that should be installed in the network devices. Therefore, it is possible to have statistics of the flows and track possible anomalies such as an unexpected increase of the throughput in one or more of the flows. This allows to detect a DoS attack and mitigate it, installing the appropriate rules. Simulation results obtained with the application when using virtual switches in a network with a linear topology are presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14105</doi>
          <udk>004.72</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>DoS attack</keyword>
            <keyword>software-defined networking</keyword>
            <keyword>OpenDaylight</keyword>
            <keyword>controller</keyword>
            <keyword>proactive rules</keyword>
            <keyword>reactive rules</keyword>
            <keyword>throughput</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.5/</furl>
          <file>50-59.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>60-69</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Hanafi</surname>
              <initials>M. Yassine</initials>
              <email>hanafi.med.yassine@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <researcherid>AAH-8784-2019</researcherid>
              <scopusid>35303230700</scopusid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St.Petersburg Polytechnic University</orgName>
              <surname>Vyacheslav</surname>
              <initials>P.</initials>
              <email>shkodyrev@imop.spbstu.ru</email>
              <address>Polytechnicheskaya, 29, St.Petersburg, 195251, Russia</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Reinforcement learning for industrial manufacturing control system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The problem posed is a very general case of optimal control of a dynamic, potentially stochastic, and partially observable system for which a model is not necessarily available. We analyze the disadvantages of classical approaches of the control theory and present a new modified numerical reinforcement learning rule of machine learning algorithm. Control theory is a field that has been studied for a very long time and which deals with the behavior of dynamic systems and how to influence it. Among the best-known examples are LQG (Linear Quadratic Gaussian) or PID (Proportional Integral Derivative) controllers. Most of the existing approaches presuppose (analytical) knowledge of the dynamic system, and one of the constraints is the need to be able to free oneself from a priori models. We focus on modified reinforcement learning approach to adaptive control policy as perspective area of control of complex dynamical system under uncertainty.</abstract>
        </abstracts>
        <codes>
          <doi>10.18721/JCSTCS.14106</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>reinforcement learning</keyword>
            <keyword>multi agent system</keyword>
            <keyword>oil manufacturing</keyword>
            <keyword>Bellman equations</keyword>
            <keyword>dynamic programming</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://infocom.spbstu.ru/article/2021.68.6/</furl>
          <file>60-69.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
