IJE TRANSACTIONS A: Basics Vol. 32, No. 4 (April 2019) 548-554    Article in Press

PDF URL: http://www.ije.ir/Vol32/No4/A/12-3052.pdf  
downloaded Downloaded: 21   viewed Viewed: 106

O. V. Chernoyarov, M. M. Shahmoradian, M. Marcokova and Y. E. Korchagin
( Received: October 07, 2018 – Accepted: March 07, 2019 )

Abstract    We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized access by the outsider takes place in the situation when the signal parameters are completely or partially unknown. We then define the degree of the transmitted data secrecy by the secrecy ratio determining how highly the threshold signal-to-noise ratio increases when there is the unauthorized access instead of the authorized one.


Keywords    Rectangular Impulse; Signal Detection; Authorized Access; Unauthorized Access; Threshold Signal-to Noise Ratio; Error Probabilities



در این کار تجزیه و تحلیل مقایسه ای از الگوریتم های تشخیص پالس مستطیلی در پس زمینه نویز سفید گاوسی در زمان اجرای دسترسی مجاز و غیر مجاز به اطلاعات منتقل شده انجام شده است. فرض بر این است که در واقع اطلاعات منتقل شده در وجود یا عدم وجود سیگنال خلاصه میشود. مساله این است که دسترسی غیرمجاز بوسیله بیگانه، در شرایطی اتفاق می افتد که پارامترهای سیگنال به طور کامل یا جزئی ناشناخته هستند. سپس درجه پوشیدگی اطلاعات منتقل شده، بوسیله نرخ پوشانندگی تعریف میشود که مشخص میکند آستانه نسبت سیگنال به نویز وقتی که به جای دسترسی مجاز، دسترسی غیر مجاز وجود دارد افزایش پیدا میکند.


1. Asadi Saeed Abad, F., and Hamidi, H., “An architecture for security and protection of big data”, International Journal of Engineering, Transactions A: Basics, Vol. 30, No. 10, (2017), 1479-1486.
2. Mohammadi, A., and Hamidi, H., “Analysis and evaluation of privacy protection behavior and information disclosure concerns in online social networks”, International Journal of Engineering, Transactions B: Applications, Vol. 31, No. 8, (2018), 1234-1239.
3. Mohammadi, A., and Hamidi, H., “Analyzing tools and algorithms for privacy protection and data security in social networks”, International Journal of Engineering, Transactions B: Applications, Vol. 31, No. 8, (2018), 1267-1273.
4. Middleton, D., “An Introduction to Statistical Communication Theory”, New Jersey, Wiley-IEEE Press, (1996).
5. Kay, S. M., “Fundamentals of Statistical Signal Processing, Volume II:  Detection Theory”, New Jersey, Prentice Hall, (1998).
6. Van Trees, H. L., Bell, K. L., and Tian, Z., “Detection, Estimation, and Modulation Theory, Part I, Detection, Estimation, and Filtering Theory”, New York, Wiley, (2013).
7. Barton, D. K., “Radar System Analysis and Modeling”, Norwood, Artech House, (2005).
8. Heyde, C. C. “Quasi-Likelihood And Its Application: A General Approach to Optimal Parameter Estimation (Springer Series in Statistics)”, New York, Springer-Verlag, (1997).
9. Korchagin, Y. E., Chernoyarov, O. V., Salnikova A. V., and Shakhtarin, B. I., “Algorithms for the detection of a signal with unknown amplitude and duration against white noise”, 2015 International Conference on Modeling, Simulation and Applied Mathematics (MSAM2015), Phuket, Thailand, (2015), 23-24.
10. Trifonov, A. P., and Korchagin, Y. E., “Optimal reception of a rectangular pulse with unknown appearance and disappearance times”, Radiophysics and Quantum Electronics, Vol. 43, No. 4, (2000), 245-255.
11. Chernoyarov, O. V., Salnikova, A. V., Rozanov, A. E., and Marcokova, M., “Statistical characteristics of the magnitude and location of the greatest maximum of Markov random process with piecewise constant drift and diffusion coefficients”, Applied Mathematical Sciences, Vol. 8, No. 147, (2014), 7341-7357.

Download PDF 

International Journal of Engineering
E-mail: office@ije.ir
Web Site: http://www.ije.ir