Scientific electronic reviewed journal
Systems of Control, Communication and Security
ISSN 2410-9916

№3 2019

Control systems
  • N. R. Halimov, A. V. Mefedov
    The distributed network-centric control system of an attacking unmanned aerial vehicles group
  • Abstract
    • Problem statement. Promising areas of the development of military aviation, which would significantly increase the effectiveness of attack aircraft complexes, are unmanned aerial vehicles complexes creating and the development of tactics for their use. Recent decades military conflicts analysis shows a significant increase of the role of unmanned aviation, both in solving the tasks of providing other troops types, and in solving intelligence, attack and special tasks. At the present stage of the development of military unmanned aviation, activities are underway to create new strike unmanned aerial vehicles capable to solve tasks as part of a group. That’s why, it is important to solve the problem of justifying the structure of the distributed control system for a group of drone unmanned aerial vehicles and developing algorithms for its operation. These algorithms make it possible to increase the efficiency of group use of drone unmanned aerial vehicles by coordinating their joint actions in autonomous mode. Purpose. Justification of the structure of the distributed control system of a group of drone unmanned aerial vehicles and the development of algorithms for coordinating their interaction to maximize the target indicator using as the example an attack of several equally important targets in the autonomous mode are aims of the paper. Methods. To justify the structure of the distributed control system for a group of unmanned aerial vehicles and to develop an algorithm for coordinating their interaction systems analysis methods were used. To synthesize the efficiency index of coordinated actions of unmanned aerial vehicles, the method of hierarchy analysis and linear programming methods were used. The method of simulation modeling was used to evaluate the effectiveness of the algorithm for coordinating actions of unmanned aerial vehicles in various situations. Novelty. The element of novelty is the development of the theory of the unmanned aerial vehicles group control system functioning, which allows to organize their coordinated actions in an autonomous mode based on the multiagent systems theory. Also a new integral indicator of the quality of assessment of group actions of unmanned aerial vehicles is developed. Result. The use of the distributed network-centric control system of a group of unmanned aerial vehicles allows to increase the effectiveness of a group attack by using the unmanned aerial vehicles attack up to 23%. The average gain is 16%. Practical relevance. The proposed distributed network-centric control system for a group of drone unmanned aerial vehicles and algorithms for its operation can be used by developers of the unmanned aerial vehicles when designing new types of aircrafts.
  • Key words
    • control system; distributed control system; multiagent system; unmanned aerial vehicle; target distribution; group activities; coordinated attack
  • Reference
    • Halimov N. R., Mefedov A. V. The distributed network-centric control system of an attacking unmanned aerial vehicles group. Systems of Control, Communication and Security, 2019, no. 3, pp. 1-13. DOI: 10.24411/2410-9916-2019-10301 (in Russian).
Robot-technological systems
  • V. B. Sychkov
    Effectiveness Evaluating Method of Anthropomorphic Robot Manipulators Copying Control
  • Abstract
    • Purpose. The presence of a large number of heterogeneous scientific and technical solutions in the field of an anthropomorphic robot manipulators (ARM) copying control actualizes the issues of their effectiveness comparison by quantifying the effectiveness of copying control process. The efficiency of the ARM copying control is the similarity requirements compliance between the operator’s hands positions and the positions of the ARM, as well as maximization of the involved ARM working space, and the collisions avoidance of ARM links. According to the known effectiveness evaluating method of ARM copying control, based on the rotation angles coincidence between the operator’s hand positions and the positions of ARM, some positions of the operator’s hands are unacceptable for some positions of the ARM, but such ARM positions are rather effective. The aim of the work is the methodological support of the quantitative comparison of mathematical methods and technical solutions in the field of the MAR copying control, especially ARM positions. To achieve the aim of the work an analysis of the copying control imposed requirements is carried out and method of quantifying the effectiveness of the ARM copying control for particular operator’s hand positions is proposed. In addition, integral evaluation criterions are introduced, which allows to compare the efficiency of copying control of various methods and technical solutions throughout the all possible configuration spaces of operator's hands positions. Methods: artificial parameters that characterize the positions of the operator hands and the ARM are introduced. The deviations of the introduced artificial parameters of the ARM positions from similar parameters of the hands of the operator are used as the evaluation criteria. Novelty: an element of novelty of the proposed method is the ability to produce more productive assessment of the effectiveness of the ARM copying control by using the following parameters for comparison: 1) the Euler angles of the operator’s hand and Euler angles of the ARM wrist link; 2) the Euler angles of the plane formed by the shoulder, wrist and elbow joints of the operator’s hand, and similar ARM angles; 3) the «degree of straightening» of the operator’s hand and a similar degree of ARM. The use of the proposed method avoids an incorrect assessment of the effectiveness of the ARM copying control in positions where the palms of the operator’s hands are close to each other. At the same time, the proposed method makes it possible to take into account not only the position and orientation of the operator’s hands, but also the elbow joints. The performed simulations showed that the ARM positions, which are effective if the alternative method is used, are unacceptable for some positions of the operator’s hands. On the other hand, expedient positions of the ARM are effective if the developed method is used and ineffective if the alternative method is used. The developed method allows to quantify and compare the effectiveness of the existing and developed ARM copying control systems.
  • Key words
    • anthropomorphic robot, anthropomorphic manipulator, copying control, effectiveness evaluation method, Euler angles
  • Reference
    • Sychkov V. B. Effectiveness Evaluating Method of Anthropomorphic Robot Manipulators Copying Control. Systems of Control, Communication and Security, 2019, no. 3, pp. 179-201. DOI: 10.24411/2410-9916-2019-10309 (in Russian).
Information security
  • E. V. Zabegalin
    The logical model of integrated technical diagnostics of information security of organizations and significant objects of critical information infrastructure
  • Abstract
    • Relevance of the problem: The Doctrine of Information Security of the Russian Federation (DIS) uses a systematic approach to analyse and ensure information security of the country. This approach considers the country's information security as such of its information sphere which has a complex structure described in the DIS. The author deems it relevant to logically project this systematic approach from the top hierarchical level of the country to other hierarchical levels, including the level of organizations and significant objects of critical information infrastructure, in order to effectively implement the provisions of the DIS. Such logical projection should begin with defining the concept of the information sphere (infosphere) of an organization / critical information infrastructure object (Org/CIIOb) and end with the definition of a standard set of measures to ensure the security of the Org/CIIOb infosphere - measures that are fully adequate to the complex structure of the infosphere and many typical threats to its security. The article is aimed at expanding the standard logical model for the corporate information security management system (ISMS) by adding to it integrated technical diagnostics of the security of the Org/CIIOb information sphere. The diagnostics should include the process function of technical testing of infosphere security by dangerous information and technical impacts (ITI) examined by Russian specialists in their publications. Method for solving the problem: first, based on the concept of the country's information sphere defined in the DIS, the concept of the Org/CIIOb infosphere is to be worked out and typical threats to its security are to be systematized, as well as types of corresponding protective measures; then, in accordance to the ISMS standards, a wider logical model for measures ensuring the Org/CIIOb information security as the Org/CIIOb infosphere security is to be elaborated; and then, based on the ideas of Russian experts on the use of the ITI for technical testing of CIIOb security, a logical model for complex technical diagnosis of the Org/CIIOb information security is to be developed, using graphic notations for logic modeling «Value-added Chain Diagram», «Idef0», and a semantic networks notation. The novelty of the solution consists in substantial elaborating of the concept «information sphere of an organization / critical information infrastructure object» as well as in the development of a logical model for possible complex technical diagnosis of the Org/CIIOb information security (security of the infosphere). This model expands the standard logical model for the corporate ISMS. The theoretical significance of the paper lies in the logical projection of the doctrinal concept of the country's information sphere on the level of organizations and significant objects of critical information infrastructure, as well as in the logical modeling of possible complex technical diagnostics of the Org/CIIOb information security (infosphere security).
  • Key words
    • information security, information sphere, infosphere, information security management system, technical di-agnosis, technical testing, information and technical impact, logical model
  • Reference
    • Zabegalin E. V. The logical model of integrated technical diagnostics of information security of organizations and significant objects of critical information infrastructure. Systems of Control, Communication and Security, 2019, no. 3, pp. 145-178. DOI: 10.24411/2410-9916-2019-10308 (in Russian).

  • A. O. Khlobystova, М. V. Abramov, A. L. Tulupyev
    Maximum likelihood estimation methods of social engineering attack trajectories detection and information system compromised users revelation
  • Abstract
    • Purpose. Nowadays, one of the most important issues of information security for organizations is increasing number of successful social engineering attacks. Significant feature of such attacks is the complexity of related incidents investigation. Currently, there are methods for investigating information secure incidents, which occurs due to use by malefactors hardware-software vulnerabilities, however, there are no similar widely used tools if social engineering attacks incident happens. The aim of the work is to develop maximum likelihood estimation methods, which are directed to detect social engineering attack trajectories and information system compromised users. It facilitates the investigations of social engineering attacks. Methods. A probabilistic approach to assess the degree of user vulnerability to social engineering attacks, an organization information system graph model, which represents user profiles and relations between them, and, also, the critical user documents are used. The novelty of the work is the capability to take into account the susceptibility of staff to social engineering impact, in contrast to earlier investigations of information security incidents, which were based only on technical characteristics. The article proposes an approach, based on probabilistic assessment of single-running and multi-running social engineering attacks which rely, for example, on user vulnerabilities. The result of the work is the approach which helps to conduct an initial investigations of information security incidents which belong to social engineering attacks. The approach is based on maximum likelihood method, which detects social engineering attack trajectories and reveals information system compromised users. The approach is based on the analysis of the social graph of the organization employees and the probabilistic graphical model. The practical significance of the results lies in the development of a tool for decision-makers, which makes it possible to reduce the search space when incidents related to successful social engineering attack implementation are investigated; to minimize the time needed to investigate crimes; to define the basis for the subsequent development of recommender system which reduce the social engineering attacks implementation risk.
  • Key words
    • social engineering attacks, psychological information impact, backtracking incidents, investigation attacks, trajectories of the spread, information security, user protection, user vulnerability, social net-works, social graph
  • Reference
    • Khlobystova A. O., Abramov М. V., Tulupyev A. L. Maximum likelihood estimation methods of social engineering attack trajectories detection and information system compromised users revelation. Systems of Control, Communication and Security, 2019, no. 3, pp. 202-219. DOI: 10.24411/2410-9916-2019-10310 (in Russian).
Transmission, reception and processing of signals
  • A. V. Petrov, V. V. Mikhalev
    Bit-Error Rate in a Digital Data Transmitting Channel at Chaotic Impulse Noise with Random Radio-Pulse Duration Action
  • Abstract
    • Problem statement: ensuring protection or destruction of information transmitted by digitally modulated signals in the radio wave range, implies an anti-jamming robustness assessment of a data transmission channel at signal-like interference action. One of the possible types of such interference is chaotic pulse jamming (CPJ) which is a kind of sequence of non-overlapping radio pulses with randomly duration changes from pulse to pulse. When estimating the bit-error rate in CPJ environment, it becomes necessary to take into account the probabilistic characteristics describing the number and duration of CPJ radio pulses affecting the channel at an arbitrary signal transmission interval. The aim of the work is to find the probability of a given number of CPJ radio pulses falling in the signal transmission interval in a data transmission channel as well as the probability distribution density of CPJ pulse durations within the signal transmission interval in order to estimate the bit-error rate in digital data transmission channels under the influence of CPJ with random radio pulse duration. Methods used: when evaluating the probabilistic characteristics, CPJ has been considered in which the end of the previous radio pulse is the beginning of the next one. It is assumed that the sequence of such moments on the time axis forms the Palm flow. An arbitrary signal transmission interval is a randomly selected segment of a given duration on the time axis. The number of flow moments and the duration of the intervals between them are related to the duration of CPJ impulses by deterministic functional transformations, so that why the desired characteristics are obtained using the methods of finding the probability characteristics for functions of random variables. Novelty: in contrast to the models of signal-like interference that are widely used to assess the anti-jamming robustness of digital data transmission channels, the paper discusses CPJ with a random duration of a radio pulse, described by the arbitrary distribution law. Result: analytical expressions have been obtained for the probabilistic characteristics describing the number and duration of CPJ radio pulses affecting the digital data transmission channel at the arbitrary time interval, which make it possible to assess the bit-error rate in digital data transmission channels. Practical significance: the obtained analytical expressions can be used to evaluate the anti-jamming robustness of digital data transmission channels, substantiate the structures of the most unfavorable interference for them while developing means and methods for information destruction or protection and also in the interests of ensuring the electromagnetic compatibility of electronic facilities.
  • Key words
    • chaotic pulse jamming, bit-error rate, jamming-to-signal ratio, interference radio pulse to signal radio pulse duration ratio, uniformly distributed initial phase of radio pulse, quadrature amplitude shift keying
  • Reference
    • Petrov A. V., Mikhalev V. V. Bit-Error Rate in a Digital Data Transmitting Channel at Chaotic Impulse Noise with Random Radio-Pulse Duration Action. Systems of Control, Communication and Security, 2019, no. 3, pp. 33-50. DOI: 10.24411/2410-9916-2019-10303 (in Russian).
Communication systems and telecommunication network
  • A. V. Zuev
    Channel resources distribution based on the auction method of controlling access to the transmission medium in a cognitive radio network
  • Abstract
    • Purpose. The technologies of dynamic access to radio frequency spectrum (RFS) can increase the efficiency of RFS use by various communication services as well as cognitive radio systems. The combination of such technologies helps to organize the reception-transmission channel in both: li-censed and unlicensed areas of the RFS. A new method and a new protocol of controlling access to radio channels in cognitive radio network using the auction distribution model of free RFS are pro-posed in the article. The aim of the work is to increase the efficiency of the channel resource use, based on the proposed method, through the free temporary channels use in a cognitive radio network. The bandwidth increase for free frequency channels detection is the aim of the work too. Methods. The solution of the channel resource distribution efficiency problem based on the channel resource auc-tion distribution method. Users are divided into several independently functioning groups. Each group applies the method independently, within the framework of the proposed model, to obtain the required radio channels for temporary use. Novelty. A new method and a new model of a cognitive access con-trol to the Media Access Control layer (MAC) are proposed. In MAC radio electronic means (REM) of the secondary users (SU) use auction model with «cost-effectiveness» criterion. Using this criterion means that temporary free resources of RFS are used for maximum by RF user groups and revenues are increased for maximum for licensed users, which are owners of the RFS. Results. The proposed method of auction resource allocation allows to use RFS for SU more efficiently in comparison with existing protocols, and guarantees objective distribution of the channels between SU groups. There has been used 5 and 8 SU groups and several methods, including the developed one, to distribute the channel resource during the simulation. The bandwidth was compared depending on the percentage of free channels. The percentage of free channels use was compared depending on the method used. According to the results, the developed method allows you to keep the bandwidth value of the dedicat-ed channel as close as possible to the theoretical value. Free channels use efficiency increases to 100%, which is several times greater than using the existing methods. Practical relevance. Proposed method raises efficiency of using a free radio frequency resource and increases the bandwidth of the channel allocated to each user of the cognitive network.
  • Key words
    • auction model, cognitive radio, programmable radio communication system, NS3 simulator, MAC protocol, cognitive radio system, media access control protocol, software-defined radio
  • Reference
    • Zuev A. V. Channel resources distribution based on the auction method of controlling access to the transmission medium in a cognitive radio network. Systems of Control, Communication and Security, 2019, no. 3, pp. 14-32. DOI: 10.24411/2410-9916-2019-10302 (in Russian).

  • S. I. Makarenko
    Descriptive Model of MUOS satellite communication system
  • Abstract
    • Relevance. Providing communicational services for the military units, which protect Russian interests outside the country’s border, needs the development of a military satellite communication systems (MILSATCOMM), which possesses a global cover zone of the Earth. Nowadays, in Russia several of such projects are being developed. At the same time, justification of technical solutions for these MILSATCOMM demands basic data formation for various options of the organization of communication modeling. To provide such basic data formation, another technologically developed MILSATCOMM can be used. This MILSATCOMM is the Mobile User Object System (MUOS). MUOS provides global communication services for mobile divisions of the US Armed Forces and can be considered as a Russian MILSATCOMM prototype. The purpose of work is the descriptive MUOS MILSATCOMM model formation. Such descriptive model can be used for the basic data formation development, when coherent processes are being modeling in Russian MILSATCOMM, to make the scientifically based choice of the communicational organization principles, which are used in MILSATCOMM. For descriptive MUOS MILSATCOMM model development, only open sources are used. Results and their novelty. The elements of practical novelty of work are the revealed general technological features of MILSATCOMM construction and the used MILSATCOMM technology solutions. MUOS is used as the example. In particular, the general formation regularities of orbital satellite group, the principles of channel forming in «up» and «down» lines, the joint use options of a new and «inherited» channel-forming equipment, and also, the use of various technology solutions for increasing an anti-reconnaissance protection and an anti-jam robustness are described. Practical significance: The descriptive model presented in this work can help technical specialists to substantiate new technology solutions for domestic MILSATCOMM. Also, this model can help scientists and candidates conducting scientific research in the field of satellite communication.
  • Key words
    • model, descriptive model, satellite communication system, mobile satellite communication system, SATCOMM, MILSATCOMM, MUOS
  • Reference
    • Makarenko S. I. Descriptive Model of MUOS satellite communication system. Systems of Control, Communication and Security, 2019, no. 3, pp. 89-116. DOI: 10.24411/2410-9916-2019-10306 (in Russian).

  • A. A. Belov, V. A. Ermolaev, Y. A. Kropotov, A. Y. Proskuryakov
    Research of the information exchange systems with discrete and distributed lag and delayed feedback modeling issues
  • Abstract
    • Problem statement. When models of information exchange systems, for example, telecommunication audio-exchange systems with discrete and distributed lag and delayed feedback, are constructed, functional differential equations are used. But, the problem of solving functional differential equations is constrained because of the uncertainty of the parameters of the simulated system. Such uncertainty occurs because of the lack of accurate information about the parameters of the model elements, natural spread of the parameters and changes in parameters in time, and also because of the delay value. Research of the information exchange systems with discrete and distributed lag and delayed feedback modeling issues, identification of the parameters of the telecommunication audio exchange systems models under interference conditions are purposes of the work. Methods. In a process of numerical modeling, a single-channel model is being considered. This model is represented as a second-order resonant link and a pulse-shaped core, which is described as the sum of two decreasing exponentials. To analyze the systems with acoustic feedback models stability, frequency method is used. The approach to estimate the correlation and spectral functions of acoustic signals and noise components, based on the parametric representation of the noise components is considered in the paper. Novelty. Introduced continuous «aftereffect» models give a better result, then other well-known differential-difference models, when the character of the acoustic echo must be considered in confined spaces. It increases the reliability of the simulation results. At the same time, the problem of finding functions, which characterize the magnitude delay distribution of the echo, requires to solve the identification problem. These functions (kernels) are approximated by a number of exponentials, which simplifies the equations and allows to accept the aftereffect focused both on a finite and an infinite interval. The echo components, due to the confined spaces resonances, are modeled by the transfer functions of the corresponding linear links. Results. Problems of the models of systems with acoustic feedback and models which help to increase the stability of speakerphone and warning systems development, using methods of the theory of linear functional-differential equations are solved. Also the echo level reducing at the speech-converting devices inputs problem is solved. It helps to increase the quality of speech-converting devices functioning. Practical relevance. The model of systems with acoustic feedback, the model of systems with discrete and distributed delay, based on functional-differential equations solving methods, are the solutions of the uncertainty eliminating problem, if the quality of voice communication and notification is improved.
  • Key words
    • functional-differential equations, model of systems with acoustic feedback, echo signals, voice com-munication, scoring, acoustic signals, distribution functions approximation, correlation function, adaptive filter
  • Reference
    • Belov A. A., Ermolaev V. A., Kropotov Y. A., Proskuryakov A. Y. Research of the information exchange systems with discrete and distributed lag and delayed feedback modeling issues. Systems of Control, Communication and Security, 2019, no. 3, pp. 220-238. DOI: 10.24411/2410-9916-2019-10311 (in Russian).
Electronic and radio systems
  • A. A. Sobko, A. V. Osintsev, M. E. Komnatnov, T. R. Gazizov
    Method of synchronization of a group of microcontrollers of different types with management of the synchronous work duration
  • Abstract
    • The relevance of the work: Modern radio electronic facilities (REFs) consist of a large number of electronic components, some of which are microcontrollers (MCs). MCs are widely spread due to miniaturization and combination of processor and peripheral devices functions in one crystal. Use of several MCs for solving a general task and working with a large number of peripheral devices leads to the problem of the MCs group work synchronization. The aim of the work is to develop a hardware-software method of synchronization of the MCs group work with a possibility to control synchronous work with the general period of work for all MCs. MCs can have different computing architectures functioning at different system frequencies. Novelty: synchronization of the MCs group using external interrupt handlers, without making additional hardware changes in the REFs with the possibility of adding a new MCs to the synchronized group without additional hardware and software changes is the novelty of the work. Results: the developed method allows to synchronize the work of various computer systems, such as MCs, systems on a crystal, programmable logic integrated circuits, systems on a module, etc. computing tools. This method allows each MC to perform a separate task (code) synchronously in the MC group of different architectures, regardless of the frequency of each MC. Using the common MC reset bus allows to restore synchronous operating if a failure happens. Using the common bus to reset the synchronization pulse counter, allows to avoid the accumulation of counting errors and to minimize the waiting time for all MCs to be ready before synchronous operation. Practical relevance: synchronization of a group of computational tools (MC, FPGA, SoC, SoM) working on different system frequencies, performing a common task, as well as the scalability of the system. The proposed method of synchronization can be used in the development of complex (combined) control systems, in the work process of which two or more computing tools are involved, for example, in robotic systems, distributed control systems, unmanned aerial vehicles, measuring instruments, Internet of things, sensor networks and other areas. At the same time, this method of synchronization is reliable, if we speak about the system structure information security, and allows you to hide detailed technical information, for example, models type and quantity of synchronously working computing means, kind of tasks at the time of synchronization which other computing means perform and working mode: synchronous mode or asynchronous mode . Application of the reverse engineering methods and study of the program code of a separate computational mean can’t give detailed information. As it is necessary to apply the reverse engineering methods to explore the developed devices in general.
  • Key words
    • synchronization, microcontroller, oscillator, computing architecture, pulse width modulation, real time clock
  • Reference
    • Sobko A. A., Osintsev A. V., Komnatnov M. E., Gazizov T. R. Method of synchronization of a group of microcontrollers of different types with management of the synchronous work duration. Systems of Control, Communication and Security, 2019, no. 3, pp. 51-63. DOI: 10.24411/2410-9916-2019-10304 (in Russian).

  • O. P. Kurkova, V. V. Efimov
    Computational Modeling and Circuit Solutions Optimization of the Contactless Chargers of the Electric Vehicles
  • Abstract
    • Problem statement and specific task. Тhe creation of new models and the expansion of the use of battery electric transport is the most progressive direction of the development of public, corporate and personal transport infrastructure. Electric transport has undeniable advantages in relation to hydrocarbon energy vehicles (EV). However, the consumer appeal of electric vehicles is still limited because of undeveloped infrastructure of charging stations (CS). Building the CS infrastructure is one of the strategic objectives of the Russian transport development. The most promising technology of electric vehicle charging is the wireless contactless charging technology. The main advantages of this technology are: safety, comfort, energy efficiency and vehicles versatility, concerning different types and brands of these vehicles. However, it is necessary to create high-power chargers with working capacity from several tens to several hundred kW, to provide the fast contactless charging technology. High power contactless chargers (CC) can be created through the use of the energy transfer principles which are based on the magnetic resonance induction. However, the development of such CC is associated with a number of scientific and technical issues. But, nowadays, the theoretical basis for solutions of these issues has not been sufficiently studied and defined yet. The aims of the work are computational modeling and effectiveness evaluation of different circuit solutions for CC creating. Identification of the patterns of various factors which influence the CC effectiveness and providing possibility of the choice of the most optimal solution for the creation of high-power CC are the aims of the work too. The methods and technologies used. To solve computational modeling and circuit analysis problems toolbox «Simulink» with the library «SimPowerSystems» of the MatLab application package is used. This library includes another library with components for modeling and simulation of electric power systems and tools for analysis. Novelty of result. The elements of novelty are: 1. The results of modeling, analysis and effectiveness evaluation of four possible circuit solutions. 2. The identified patterns of influence on the efficiency of the CC, with different circuit models design bases, such factors as: level of the frequency range, capacitance, distance between the primary and secondary windings of inductance, asymmetry of geometry and mutual arrangement of windings. 3. The development of the integrated calculation method of approximate values of output parameters for each variant of circuit solutions. Practical significance: The models which were being used during the research process can be used as initial prototypes for the development of various-purpose CC with specific requirements and also these models can reduce the complexity of the prototypes development and testing. Practical significance: The models used in the research process can be used as initial prototypes in the development of various-purpose CC with specific requirements, to reduce the complexity of the development and testing of prototypes.
  • Key words
    • electric vehicle, charging infrastructure, contactless charger, magnetic-resonance induction, selfinduction, mutual induction, coupling coefficient, voltage, current, frequency, power, efficiency, efficiency, power factor, simulation, circuit design solution
  • Reference
    • Kurkova O. P., Efimov V. V. Computational Modeling and Circuit Solutions Optimization of the Contactless Chargers of the Electric Vehicles. Systems of Control, Communication and Security, 2019, no. 3, pp. 64-88. DOI: 10.24411/2410-9916-2019-10305 (in Russian).

  • V. R. Sharafutdinov, T. R. Gazizov
    Analysis of reservation methods based on modal filtration
  • Abstract
    • Problem statement. Insufficient attention to reliability and electromagnetic compatibility (EMC) of radio electronic equipment (REE) for systems of control, communication and security is, usually, impermissible. To improve REE reliability a known way, called «cold backup» is used. It means that when functioning circuit fails, the power is supplied to another one, which do not used earlier. When the first circuit is functioning, another one do not used, and, practically, do not influenced on the first one’s working process. When the first circuit fails, another one takes over the functioning. But, backup devices greatly increase REE characteristics, such as weight, size and cost, which is often unacceptable. Heavily growing EMC issue, which requires additional measures, worsens the indicated characteristics. Therefore, it is important to develop new methods, which would increase the REE reliability and REE EMC ensuring. The purpose of the work is to provide a systematic view of new backup methods, known as modal reservation (MR) ways, which allow to ensure REE EMC by applying modal filtration. Methods used. Reliability and EMC are achieved in a single technical solution, rather than by using separate means. Electromagnetic coupling effect which appears in the reserved and reserving interconnects of a nonhomogeneous dielectric filling allows to reach REE reliability and REE EMC. To analyze the methods evolution, a technical systems evolution lines idea from the Theory of Inventive Problem Solving is used. Novelty. A modal filtration using reservation interconnects is realized in MR methods for the first time. Moreover, it is the first time when peculiarities, benefits, drawbacks and evolution of the MR methods are considered in a single work. The systematic view of new approaches to MR which allows to provide REE EMC using modal filtration is the result of the work. Practical relevance: Widely and effectively ways of the developing of MR approach to increase reliability and EMC ensuring of critical REE are discovered. Also the basis for successful completion of RSF project 19-19-00424 is received.
  • Key words
    • reservation, electromagnetic compatibility, interconnects, printed circuit board, modal decomposition, ultrashort pulse
  • Reference
    • Sharafutdinov V. R., Gazizov T. R. Analysis of reservation methods based on modal filtration. Systems of Control, Communication and Security, 2019, no. 3, pp. 117-144. DOI: 10.24411/2410-9916-2019-10307 (in Russian).