Development of a mathematical model of radio resource management of special purpose radio communication systems based on an evolutionary approach
Keywords:radio communication systems, electronic jamming, data transmission systems, radio resource management, operational management
The object of research is a special-purpose radio communication system. A special purpose radio communication system is affected by many different destructive influences. The main ones are deliberate interference and cybernetic impact of various purposes. The above causes the search for new scientific approaches to identify and identify the destructive impact on special-purpose radio communications in order to increase the operational efficiency of special-purpose radio communications systems. In this work, the problems of developing a mathematical model for managing the radio resource of special-purpose radio communication systems based on the evolutionary approach are solved.
In the course of the research, the authors of the work used the main provisions of the theory of artificial intelligence, the theory of automation, the theory of complex technical systems, as well as general scientific methods of cognition, namely analysis and synthesis. The proposed methodological approach was developed taking into account the practical experience of the authors of this work during military conflicts of the last decade.
The research results will be useful for:
– development of new radio resource management algorithms;
– substantiation of recommendations for improving the efficiency of radio resource operational management;
– analysis of the radio-electronic situation during the conduct of hostilities (operations);
– when creating promising technologies for increasing the efficiency of radio resource operational management;
– assessment of the adequacy, reliability, sensitivity of the scientific and methodological apparatus for the operational management of the radio resource;
– development of new and improvement of existing radio resource management models.
Directions for further research will be aimed at developing a methodology for intelligent control of the radio resource of special-purpose radio communication systems.
Shyshatskyi, A. V., Bashkyrov, O. M., Kostyna, O. M. (2015). Rozvytok intehrovanykh system zviazku ta peredachi danykh dlia potreb Zbroinykh Syl. Ozbroiennia ta viiskova tekhnika, 1 (5), 35–39.
Tymchuk, S. (2017). Methods of Complex Data Processing from Technical Means of Monitoring. Path of Science, 3 (3), 4.1–4.9. doi: http://doi.org/10.22178/pos.20-4
Romanenko, І. О., Shyshatskyi, A. V., Zhyvotovskyi, R. M., Petruk, S. M. (2017). The concept of the organization of interaction of elements of military radio communication systems. Science and Technology of the Air Force of the Armed Forces of Ukraine, 1, 97–100.
Shevchenko, D. (2020). The set of indicators of the cyber security system in information and telecommunication networks of the Armed Forces of Ukraine. Modern Information Technologies in the Sphere of Security and Defence, 38 (2), 57‒62. doi: http://doi.org/10.33099/2311-7249/2020-38-2-57-62
Makarenko, S. I. (2017). Prospects and Problems of Development of Communication Networks of Special Purpose. Systems of Control, Communication and Security, 2, 18–68. Available at: http://sccs.intelgr.com/archive/2017-02/02-Makarenko.pdf
Dudnyk, V., Sinenko, Y., Matsyk, M., Demchenko, Y., Zhyvotovskyi, R., Repilo, I. et. al. (2020). Development of a method for training artificial neural networks for intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 3 (2 (105)), 37–47. doi: http://doi.org/10.15587/1729-4061.2020.203301
Brownlee, J. (2011). Clever algorithms: nature-inspired programming recipes. LuLu, 441.
Gorokhovatsky, V., Stiahlyk, N., Tsarevska, V. (2021). Combination method of accelerated metric data search in image classification problems. Advanced Information Systems, 5 (3), 5–12. doi: http://doi.org/10.20998/2522-9052.2021.3.01
Meleshko, Y., Drieiev, O., Drieieva, H. (2020). Method of identification bot profiles based on neural networks in recommendation systems. Advanced Information Systems, 4 (2), 24–28. doi: http://doi.org/10.20998/2522-9052.2020.2.05
Dasgupta, D., Nino, F. (2008). Immunological computation: theory and applications. CRC press, 277. doi: http://doi.org/10.1201/9781420065466
Celada, F., Seiden, P. E. (1992). A computer model of cellular interactions in the immune system. Immunology Today, 13 (2), 56–62. doi: http://doi.org/10.1016/0167-5699(92)90135-t
Chan-Tin, E., Heorhiadi, V., Hopper, N., Kim, Y. (2011). The frog-boiling attack: Limitations of secure network coordinate systems. ACM Transactions on Information and System Security, 14 (3), 1–23. doi: http://doi.org/10.1145/2043621.2043627
Hofmeyr, S. A., Forrest, S. (2000). Architecture for an Artificial Immune System. Evolutionary Computation, 8 (4), 443–473. doi: http://doi.org/10.1162/106365600568257
Kim, S. S., Reddy, A. L. N. (2008). Statistical Techniques for Detecting Traffic Anomalies Through Packet Header Data. IEEE/ACM Transactions on Networking, 16 (3), 562–575. doi: http://doi.org/10.1109/tnet.2007.902685
Barford, P., Kline, J., Plonka, D., Ron, A. (2002). A signal analysis of network traffic anomalies. Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurment – IMW ’02, 71–82. doi: http://doi.org/10.1145/637201.637210
How to Cite
Copyright (c) 2022 Andrii Shyshatskyi, Volodymyr Ovchynnyk, Andrii Momotov, Nadiia Protas, Andriy Solomakha
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.