-□ □-
A method of adaptive control of military radio network parameters has been developed. This method allows predicting suppressed frequencies by electronic warfare devices, determining the topology of the military radio network. Also, this method allows determining rational routes of information transmission and operating mode of radio communications. Forecasting of the electronic environment is characterized by recirculation of input data for one count, resampling on a logarithmic time scale, finding a forecast for the maximum value of entropy and resampling the forecast on the exponential time scale. The developed method allows choosing a rational network topology. The choice of topology of the military radio communication system is based on the method of ant multi-colony system. The main idea of the new option of ant colony optimization is that instead of one colony of the traditional ant algorithm several colonies are used that work together in a common search space. However, this procedure additionally takes into account the type of a priori uncertainty and the evaporation coefficient of the pheromone level. The proposed method allows choosing a rational route for information transmission. The proposed procedure is based on an improved DSR algorithm. This method uses several operating modes of radio communications, namely the technology of multi-antenna systems with noise-like signals, with pseudorandom adjustment of the operating frequency and with orthogonal frequency multiplexing. The developed method provides a gain of 10-16 % compared to conventional management approaches
Keywords: radio communication system, intentional interference, radio resource, signal fading,
network topology, routing -□ □-
UDC 691.392
[dOI: 10.15587/1729-4061.2021.2253311
DEVELOPMENT OF A METHOD OF ADAPTIVE CONTROL OF MILITARY RADIO NETWORK PARAMETERS
O . N a l a p k o
Adjunct
Scientific and Organizational Department* A. Shyshatskyi PhD, Senior Researcher Research Department of Electronic Warfare Development* Е-mail: ierikon13@gmail.com V. Ostapchuk Head of Military Institute** Qasim Abbood Mahdi PhD, Head of Department Department of Computer Technologies Engineering Al Taff University-College Karrada str., 3, Karbala, Republic of Iraq, 31001 R. Zhyvotovskyi PhD, Senior Researcher, Head of Research Department Research Department of Development of Anti-Aircraft Missile Systems and Complexes*
S . Pe tr u k PhD, Deputy Head of Research Department Research Department of Development of Anti-Aircraft Missile Systems and Complexes*
Ye. Lebed
PhD, Deputy Head of Faculty of Education and Research, Head of Educational Part
Faculty of Telecommunication Systems** S. Diachenko Adjunct
The Scientific Department of Training Organization and Pedagogical Staff Certification The Scientific and Methodological Center of Scientific, Scientific and Technical Activities Organization National Defense University of Ukraine named after Ivan Cherniakhovskyi Povitroflotskyi ave., 28, Kyiv, Ukraine, 03049 V. Velychko Lecturer
Department of Automated Control Systems** I. Poliak
Lecturer
Department of Radio and Satellite Communication** *Central Scientifically-Research Institute of Arming and Military Equipment of the Armed Forces of Ukraine Povitroflotskyi ave., 28, Kyiv, Ukraine, 03168 **Military Institute of Telecommunication and Information Technologies
named after the Heroes of Kruty Moskovska str., 45/1, Kyiv, Ukraine, 01011
Received date 27.12.2020 Copyright © 2021, O. Nalapko, A. Shyshatskyi, V. Ostapchuk, Qasim Abbood Mahdi,
Accepted date 30.01.2021 R. Zhyvotovskyi, S. Petruk, Ye. Lebed, S. Diachenko, V. Velychko, I. Poliak
Published date 26.02.2021 This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0)
1. Introduction
Currently, a single global information space is being built among the elements of management systems for various purposes. The main difference of this architecture is the use of high-level systems based on the principles of building the Internet.
For this purpose, the transition is made from various types of independently functioning subsystems to integrated
communication and data transmission systems (IC DTS) that provide transmission and "seamless" connection. "Seamless" means the exclusion of manual operations while connecting subscribers and exchanging data among disparate communication systems. This, in turn, requires the use of multifunctional radios, which allow through control of the parameters of military radio communication systems.
The versatility of radio stations is realized through the use of a wide class of signals, coding methods and measures
to increase noise immunity, modes of information transmission, algorithms for choosing a rational topology and route of information transmission [1, 2].
The approximate relationship between the parameters and control variables by levels of the open systems interconnection model is given in Table 1.
Table 1
Approximate relationship between parameters and control variables by OSI (Open Systems Interconnection) model levels
OSI level Control objects Basic optimization parameters Controlling influence of the node
Physical Radio channel within radio connectivity with neighboring nodes Bandwidth, transmission time in the channel, battery power consumption, transmission power, antenna pattern, etc. Transmission power (direction), type of modulation, type of correction code, parameters, etc.
Channel Radio channels within radio communication with neighboring nodes Bandwidth and transmission time in the channel, battery power consumption, amount of service information, etc. Channel level exchange algorithms: deterministic, random, hybrid; sizes of packages and receipts
Network One or more transmission routes Amount of service information, route parameters (time of construction and existence, quantity, capacity, delivery time, battery power consumption, etc.) Network layer exchange algorithms: tabular, probe, hybrid, wave asymmetric, hierarchical, etc. Topology control algorithms
Transport Information direction of communication Bandwidth, time and variation of its transmission in the direction Queue management algorithms. Overload window size, timeout time, etc.
Applied Node, neighboring nodes, network area, entire network Bandwidth, time and variation of transmission time, battery power consumption, transmission security Algorithms (protocols) of information exchange of application level, coordination and intellectualization on OSI levels
From the analysis of Table 1, it can be concluded that in order to effectively control the parameters of military radio networks, this should be done at several levels of the OSI model.
The problem of compatibility of radio communication devices (RCD) of different standards and ranges is currently being implemented for the tactical management of the armed forces of the world's leading countries through the use of software-defined radio (SDR) and software-defined networking (SDN).
The ability of communication devices to change their basic technical characteristics through reprogramming allows you to manage channel and network resources.
A key feature of modern military operations (combat operations) is the conditions of a priori uncertainty about
the state of the electronic environment. This happens because of the dynamic change of network topology due to the movement of radio communications, physical destruction of radio communications, changes in the underlying surface and electronic suppression.
Given the above, there is an urgent scientific task of developing methods for managing channel and network resources of military radio networks in conditions of uncertainty of the electronic environment.
2. Literature review and problem statement
In [3], the tendency to create integrated hardware platforms by radio frequency and digital signal processing devices for the joint solution of communication and radar tasks is determined. However, this paper does not provide specific mechanisms for controlling the parameters of GSM communication networks for airspace monitoring.
In [4], the substantiation of ways to increase the efficiency of trunking communication systems of Ukraine is carried out. However, this type of radio communication is not resistant to electronic suppression.
In [5], the methods of increasing the efficiency of radio frequency resource use in cognitive radio networks were developed. However, this paper does not consider the impact of the location of electronic warfare on the quality of communication in the radio network.
The paper [6] proposes a dynamic channel selection algorithm based on a fuzzy inference system (FIS), capable of selecting the most available channel with the desired bandwidth, the minimum required signal-to-noise ratio and the probability of detecting a miss. The disadvantages of the proposed algorithm include not taking into account the impact of intentional interference.
The paper [7] proposes the development of the controller of access to a radio resource on the basis of a sliding window. However, this controller does not allow taking into account destabilizing factors present in radio channels, such as intentional interference and fading.
In [8], a method for monitoring the radio frequency spectrum and network architecture is proposed to regulate the spectrum distribution and control the use of the radio frequency spectrum. However, the proposed approach does not allow taking into account measures to increase the noise immunity of military radio networks.
The paper [9] proposes an algorithm for controlling the parameters of cognitive radio networks, namely: optimal power, optimal speed and optimal amount of information. This control is based on a genetic algorithm. However, the proposed algorithm takes into account only the mutual interference caused by the mutual influence of users on each other.
The paper [10] proposes a method for determining the location of radio communication devices depending on the effectiveness of electronic suppression. The proposed method allows increasing the efficiency of radio communication, but this is limited only by determining the optimal location of radio communications.
The paper [11] proposes to use clustering algorithms to control the radio resource of radio communications. The proposed algorithm is based on the distribution of radio frequencies among clusters. However, this approach does not allow adapting to the effects of intentional interference and implementing other mechanisms to increase noise immunity.
The paper [12] proposes to use artificial intelligence in problems of increasing the efficiency of cognitive radio networks. However, this research is intended only for general training (adaptation) of cognitive radio networks without specifying the factors that affect its effectiveness.
The paper [13] proposes adaptive algorithms for adjusting the threshold values of radio communication system parameters. The specified research allows allocating a useful signal against noise, adapting to a signal situation. However, this research does not allow complex control of the parameters of special-purpose radio systems.
Given the fact that the management of channel and network resources requires the processing of different units of measurement and origin of input data, it is proposed to analyze the algorithms for processing different types of data.
In [14], the development of generalized metrics in the problem of analysis of multidimensional data with different characteristics is carried out. The essence of the proposed metric is that this metric allows you to build algorithms for clustering, classification and association based on it, using classical processing methods. However, this metric does not allow effective functioning in conditions of shortage of computing resources.
The paper [15] considers the problem of information processing from heterogeneous technical monitoring devices. As a possible solution to the problem, the application of a generalized method of information processing based on the method of clustering of territorially combined information sources of monitoring and the use of a frame model of the knowledge base of the monitoring objects identification is proposed. The clustering method is formed on the basis of the hierarchical Lance-Williams agglomerative procedure using the Ward metric. The frame model of the knowledge base is built using the tools of object-oriented modeling. The disadvantages of the proposed generalized methodology include not taking into account the relative importance of the events that occur and the inability to work in a shortage of computing resources. Also, the disadvantages of this method include the inability to redistribute computing resources among the elements to increase the efficiency of information processing.
The papers [2, 16] exemplify an approach to the processing of various types of data on the state of the communication channel. The essence of the proposed approach is an assessment of the state of the communication channel and three different indicators. This approach requires complete information about the state of the channel and accumulates evaluation errors during operation.
The analysis of the works [2-16] allows us to state that the existing scientific achievements do not allow for a through management of channel and network resources of military radio networks, but only separate control influences at a separate level of the open systems interconnection model. All this does not allow using available radio resources of military radio networks effectively and counteracting comprehensively destabilizing factors that affect the efficiency of military radio networks.
Therefore, in order to increase the efficiency of military radio networks, it is necessary to conduct comprehensive control of the parameters of military radio networks at the channel and network levels of the open systems interconnection model. This can be achieved by developing appropriate control procedures that will allow:
1) at the channel level of the OSI model:
- selecting operating frequencies taking into account the impact of intentional interference and the projected strategy of electronic warfare;
- determining the rational operating mode of radio communication facilities;
2) at the network level of the OSI model:
- choosing the topology of the military radio communication system;
- choosing a rational route for the transmission of information among the elements of the military radio system;
- determining the location of transmitters of radio communication devices depending on the location of electronic warfare transmitters;
- complex management of channel and network resources at each level of the open networks interconnection model.
3. The aim and objectives of the study
The aim of the study is to develop a method for adaptive control of military radio network parameters, which would allow control at the channel and network levels of the open networks interconnection model.
To achieve the aim, the following objectives were set:
- to set the task of managing channel and network resources of military radio communication systems on the maximum bandwidth;
- to develop an algorithm for adaptive control of military radio network parameters.
4. Statement of the problem of management of channel and network resources on the maximum bandwidth
It is proposed to carry out a through management of channel and network system resources with relative observance of hierarchy at each level of the reference network open systems interconnection OSI model (open systems interconnection basic reference model).
By management of channel and network resources we mean management of the network radio resource, topology, routing and operating mode of radio communication devices [3-5].
Radio resource management is the management of frequency, code, time and energy resources among nodes of military radio communication systems, as well as determining the degree of influence of electronic suppression of the enemy.
Topology management is the operational reconfiguration of the topology of military radio communication systems and the connection of backup elements (channels, mobile base stations and nodes) in a changing situation in order to meet the maintenance of a given quality of service.
Routing management is the construction and maintenance of routes, transmission of information flows at a given topology in order to meet the quality of service flows.
We present this functional structure from the standpoint of graph theory in the form of a tree. In this case, the root of the tree will be in accordance with the control subsystem of the second level (I2, U2), and the tops of this tree, located at a distance of one edge from the root - Q first-level control subsystem (In, Un), ..., (Iq U1q), ..., (Iq, Uq). Each subsystem consists of a control unit (identification) I and a control unit U. We introduce into consideration Q zero-level subsystems, which are located at a distance of two edges from the root of
the tree. These subsystems represent interacting processes of exchange of operational and service information flows in control systems P1, ..., Pq, ..., Pq [3-5].
For the q-th control subsystem of the first level (I1q, U1q) q = 1, Q, we introduce the following notation:
- X1q (k) is the set of vectors, the state of the q-th managed subnet, where x1q (k) = {xf (k)}, a = 1, a. with the dimension a1q x 1;
- X1q (k) is the set of evaluation vectors xiq (k) = {x^ (k)}, a = 1, alq with the dimension a1q x 1;
- Ulq (k) is the set of control vectors of the q-th managed
subnet u.
(k) = [u
b = 1, b1q with the dimension b1q
x 1;
- Y1q (k) is the set of vectors of local variables that are issued to the upper-level control subsystem y1q (£) = {yfq (£)}, d = 1, d1q with the dimension d1q x 1;
- Z1q (k) is the set of vectors of local output variables z1q (k) = {zfq (k)}, d = 1, d1q with the dimension d1q x 1.
For the second level control subsystem, respectively:
- X2 (k) is the set of vectors of generalized estimates
x2 (^) = {*2 (k)}, l = 1,lr with the dimension lr x 1 = ^a1q x 1;
V q=1
- Y2q (k) is the set of vectors that are issued to the lower-level control subsystem y2q (k) = {y'dq (k)}, d = 1,d2q with the dimension d2q x 1;
- Z2q (k) is the set of vectors coordinating the output variables issued to the subsystems of the lower-level control z2q (k) = \z2q (k)}, d = 1,d2q with the dimension d2q x 1.
As a result, for the q-th subsystem of zero level Pq, q = 1, Q, we have:
- Cqp (k) is the set of connection vectors cqp (k) = {cqp(k)},
m = 1, mq, n = 1, nq, between the p-th and q-th subsystems (p, q = 1, Q, p * q );
- nq (k) is the set of vectors of external influences nq (k) = {%lq (k)}, l = 1,lq with the dimension lq x 1.
The set of state vectors X (£) = U X1q (k) can include
q=i
vectors of any state variables that affect the quality of the radio system and the efficiency of the military radio system. The main ones are:
- the vector of parameters of information load of the military radio communication system (characterizes the number of information messages that need to be transmitted per unit time at a given bandwidth):
A(Ä) = ||A1 (k),..., Aq (k), Aß (k)||T ;
- the vector of delays in the transmission of information messages of the military radio communication system (characterized by a deterioration in the bandwidth of military radio communication systems):
H(k) = ||Ht (k),..., Hq (k),..., HQ (k)||r ;
- the vector of parameters of the electronic environment in the network of the military radio communication system (the number of suppressed operating frequencies by the RES devices that do not meet the requirements for bandwidth):
K(A) = !«! (k),..., (k), se (k)||r ;
- the vector of frequency resources of the military radio communication network (total number of operating frequencies of military radio communication systems):
3(A)=||31 (k),3? (k),3e (k)|| ;
etc.
It was previously noted that the bandwidth of military radio communication systems is one of the main indicators that characterize the efficiency of the military radio communication system in general and the quality of service (QoS) of the transmitted traffic in particular. Maximizing the bandwidth of military radio systems, by optimizing the parameters of the channel and network levels, will increase the efficiency of military radio systems.
Therefore, the maximum bandwidth of the military radio communication system at the channel and network level of the open networks interconnection model with the military radio communication system in accordance with expression (1) is chosen as the optimization criterion.
c,
Ch,N '
> max
m,f fEW ,F t
(1)
where m is the number of RCD in the network; f is the number of available frequencies for transmission in the network; w is the number of available messaging routes, ro is the total number of routes, fMS is the number of suppressed frequencies by electronic warfare devices, Fopt is the optimal operating mode of the radio.
Bandwidth C when:
- fixed stations in the network m;
- load intensity X/| (where X is the package appearance intensity, | is the package processing intensity);
- package lengths Lp and the probability of damage to the package by interference pf are represented as the following functional (objective function):
C = F {m, f, w, Lp, y^, pf, k},
(2)
where k is the number of radio communication modes in the network.
pf = 1 - exp{-Lp ■ pb},
where Pb is the bit error probability.
Bandwidth value C, for different configurations f w, a/|, pf, k, Lp and m, is a nonlinear smooth unimodal function without discontinuities. The complex, nonlinear nature of the dependence of the objective function on the parameters f, w, a/|, pf, k, Lp and m does not allow determining the direction of search for the maximum of the objective function unambiguously.
Obviously, this method should solve the optimization problem, which can be formulated as follows:
C = F {m, f, w, y^, Lp, PfK}
Y =
A
Pf = 0 + 1, m = const.
^ max
m,f wpf K
= const < Lp = const,
(3)
At small values f, w, a/| pf, k, Lp and m for example, it is possible to use the method of full directional search for all possible values of variable parameters. Otherwise, it is advisable to use an optimizer that implements, for example, a discrete analogue of the Gauss-Seidel method.
The essence of the Gauss-Seidel method consists in the equivalent replacement of the general multiparameter
problem of finding the extremum of the optimality criterion, a sequence of one-parameter problems of finding partial extrema. The partial derivative of the functional that is optimized in this case has the following general form:
dl(x)/dxt = dl(x^..^xtxn)xlJdxi, il = l,...,I, (4)
the optimal value xf* can be found from the following general condition:
dl (x)/dxt = 0, xi = xf. (5)
As can be seen from expression (4), the search for optimal parameter values x'f, corresponding to the extremum dl (X)/dxi = 0, can be performed on the basis of an iterative sequential optimization procedure for each ¿-th parameter at fixed values of the other /-th parameters. The convergence of such a procedure to the optimal solution for all optimized variables is guaranteed in the presence of unimodality and differentiability of the objective function.
Thus, the proposed problem statement allows us to describe the processes occurring in military radio communication systems. The criterion of efficiency in this method is the bandwidth of the military radio system and the task of control influences at the channel and network level aimed at increasing it.
Depending on topology, each military radio network is characterized by an information matrix, the elements of which determine the values of relative bandwidth in a particular link.
Information matrix Mr of the military radio network of a typical separate mechanized brigade is shown in Table 2.
Symbols that are used in Table 2: A, A', A" are the KP, FCP, RCP crews respectively; Bj is the OP ¿-th (j-th) battalion, respectively; ¿, j are the indices that determine the number of the battalion, i, j = 1,...,I, I is the number of battalions in the brigade; bk, b/ is the KOP k-th (/-th) company, respectively; k, / are the indices that determine the company number, k, l = 1,..., K, K is the the number of companies in the battalion; b'kk, b' is the OP kk-th (//-th) platoon, respectively; kk, // are the indices that determine the platoon number, kk,ll = 1,..., KK, KK is the number of platoons in the company; Cm, Cn is the KP m-th (n-th) division (artillery (art) and AD), respectively; m, n are the indices that determine the division number, m, n = 1,..., M, M are the number of divisions in the brigade; cu, cv is the KOP u-th (v-th) of batteries, respectively; u, v are the indices that determine the battery number, u,v = l,...,Uv, Uv is the number of batteries in the v-th division; c'uu, c'rm is the OP uu-th (vv-th) platoon, respectively; uu, vv are the indices that determine the platoon number, uu, vv = l,...,UUvv, UUvv is the number of platoons in the vv-th battery; ds, dt is the OP s-th (t-th) of the individual company, respectively; s, t are the indices that determine the number of an individual company, s,t = 1,...,S, S is the number of individual companies in the team; d's, d'tt is the OP ss-th (tt-th) platoon of a separate company, respectively; ss, tt are the indices that determine the platoon number, ss,tt = 1,...,SSt, SSt is the number of platoons in the t -th separate conpany.
brigade battalion company/ battalion platoon / company division (art. and AD) battery/ division platoon/ battery separate company platoon/separate company
A, A', A" Bj b/Bj K / b / Bj Cn Cv/ Cn C / cv / cn dt d'a / dt
A, A', A" 0 CAB CAb 0 CAC CAC 0 CAd 0
Bj CBA 0, i=j; CB, i Ï j Cb i=j; ° i Ï j cnb, H; ° i * j CBC 0 0 0 0
b/Bi 0 CbB, i=j; 0, i Ï j 0, i=j; Cb, i * j cbf. H; ° i * j 0 0 0 0 0
b'a / b / B 0 cbB - i=j; 0, i Ï j cb'b, i=j; 0, i * j 0, i=j; cbj, i ^ j 0 0 0 0 0
Cm. CCA CCB 0 0 0, m=n; cC m ^ n cCc, m=n; 0, m ^ n cCc,, m=n; 0, m ^ n CCd 0
C'u/ Cm 0 0 0 0 CcC, m=n; 0, m ^ n CC, m=n; 0, m ^ n ccc, m=n; 0, m ^ n 0 0
C'uu / Cu / Cm 0 0 0 0 0 c, , m=n; 0, m ^ n cc,, m=n; 0, m ^ n 0 0
ds Ij(t) CdB 0 0 CdC 0 0 Cd, s=t; 0, 5 * t cdd,, s=t; 0, 5 * t
d's / ds 0 0 0 0 0 0 0 Cj , s=t; ° 5 * t cr, s=t; 0, 5 * t
Table 2
Information matrix of military radio communication of a typical separate mechanized brigade
Initial data used for calculations:
1) 25 kHz FHSS-TDD-QPSK military radio communication system; the devices of transmitting information that is used in the control units to the company inclusive have a radiation power of 50 W, and the devices that are used in the platoon link are characterized by a radiation power of 5 W;
2) a company of RES consisting of three platoons, which are equipped with multifunctional REO stations in the amount of 3 samples per platoon.
The power of the interference station is up to 2 kW, but the energy potential is distributed in such a way that 0.5 kW is used to suppress the telecommunications network.
The antenna system of the REO station is characterized by a radiation pattern with a width of 120° (at the level of 3 dB) and a gain of 10 dB. Each REO station places a barrier with vertical polarization in the range of the network.
5. Development of an algorithm for adaptive control of military radio network parameters
Let us consider the basic procedures of the method of adaptive control of military radio network parameters.
1. Entering initial data.
The data of the radio communication system Y={y;}, are entered, as well as the value of the allowable bit error probability Pb aiiow and the minimum data rate for each element of the military radio communication system (MRCS) and the allowable network load.
2. Assessment of the electronic environment.
The assessment of the electronic situation on the network sections is carried out by the coordinating nodes for the neighboring nodes. On radio directions, it is nodes that transmit information using one of the known methods developed by the authors in [17, 18].
3. Forecasting the state of the electronic environment.
Forecasting of the signal-interference situation for the network as a whole and for each individual radio direction of the network is carried out. The procedure differs from the known ones because it additionally contains the following operations:
- recirculation of input data for one reading;
- resampling the initial process on a logarithmic time scale;
- finding the energy spectrum of the received signal, determining the response;
- finding the entropy of the energy spectrum of the corresponding sample to be resampled,
- calculation of the maximum value of entropy responses;
- finding a forecast for the realization of the maximum value of entropy;
- resampling the forecasting result on an exponential time scale. This procedure has the following sequence of actions:
1. Entering initial data.
2. Temporary compression of the process. A class of implementations is formed, which differs from each other by the one count shifts. To form a class of discrete samples, each implementation is subject to the operation of logarithmiza-tion and sampling.
Then, we find the maximum value of entropy in accordance with the ratio:
1/2
H ( f ) = -J ln
-12
X ( f )
12
J (X(f )) df
-V2 .
df,
(6)
X ( f )
where X„ ( f ) = "12-
J (X (f )) df
is the energy spectrum of the
-12
Fig.
1. Algorithm of the method of adaptive control of MRCS parameters
sample, X(f )= ^ rss(n)exp(-2nfn), rss(n) is the correla
tion function of the process.
3. Selection of operating frequencies.
The analysis of a radio frequency resource is carried out. This procedure differs from the known ones because the choice of operating frequencies is as follows:
- determination of the number of suppressed frequency bands and the degree of their suppression (overlap coefficients of the channel). Thus, if the frequency channel is suppressed completely, it is eliminated and considered unsuitable for information transmission, if partially, it is possible to transmit information with minimum bandwidth using high-energy signal code structures, and if the channel is free from interference, then the transmission of information occurs using high-speed signal structures;
- the ellipses of continuous suppression and zones of radio communication disturbance are determined;
- using the method of nonlinear programming, the strategies of electronic suppression of the enemy are determined;
- on the basis of the data received after the procedure of forecasting the condition of the radioelectronic situation, selection of working frequencies is carried out.
On the basis of the specified information, rational MRCS topology is formed.
4. Formation of MRCS topology.
The task of network topology management is to ensure the transmission of the maximum number of messages with the required quality (reliability, efficiency, etc.).
Let us consider the problem of building a topology of a military radio network. The procedure of choosing the topology of the military radio communication system is based on the method of AMCO (Ant Multi-Colony Optimization). The main idea of the new option of ant colony optimization is that instead of one colony of the traditional ant algorithm, several colonies are used that work together in a common search space. Thus, each colony on the basis of the mechanism of a stigmergy solves the subtask, forming the part in the joint decision. To take into account special conditions of each subtask, colonies can interpret input data differently and have different parameters that influence decision-making. To avoid confusion while referring to previous experience, different pheromones are used, which are perceived only by the same colonies that left them. Moreover, in certain cases, the repulsive effect of a foreign pheromone is appropriate. Thus, the pheromone directs the colony to find a solution to its own subtask. In this case, pheromones are deposited by all colonies for the corresponding parts of the solution with the same concentration, proportional to the cost of solving the problem as a whole. Evaporation also occurs simultaneously and at the same rate.
In an ant multi-colony system, part of the solution is built by several ants at the same time. Firstly, groups of ants are formed, including one representative from each colony. In essence, each such intercolonial group is a replacement for a separate ant of the traditional version of the algorithm. The ants of the group, as a result of the "draw", form a step-by-step solution, including the vertices at each step in the order determined presumably on the basis of a combined set of alternatives. The ant in the group k, belonging to the colony x, will include in its part of the solution the vertex i on the iteration of t with a normalized probability:
P% (t ) =
(ft, (t )]"■ u)-([< J
^ ([
, (t )!■ u)-IK ]
(7)
pi, (t )=№ (t )№ i I,
(8)
then calculate once the sum of the obtained values of the non-normalized probabilities of the whole group k:
(t)
PÍf (t ) =
then perform normalization for each value according to the formula:
P (t ) =
pXk (t )
II pXk (t )•
(10)
If a more aggressive strategy of dividing the vertices among the colonies is needed in order to improve the quality of the routes themselves, a complicated formula for calculating abnormal probabilities can be used:
p:> (t )=
[t: i (tflKi T
zeV z±x
<i (t)
(11)
Y is the set of colonies;/4 is the set of available vertices for the group k; nX i is the priori attractiveness of the alternative, the reverse cost of the transition from the current top of the ant group k of the colony x to the top i; tkyi is the posteriori efficiency of the alternative, which is determined by the amount of pheromones of the colony x in the transition from the current top of the ant group k of the colony x to the top i; a, P are the customizable algorithm parameters; u is the evaporation rate of pheromone levels; i is the information uncertainty coefficient.
To avoid repeated calculation of the sum of products in the denominator of the formula, in the software implementation it is advisable to normalize the latter. To do this, it is proposed firstly to use the formula for calculating abnormal probabilities:
P (t )'
(9)
where y is the new parameter of the ant algorithm that controls the repulsive effect of pheromones from other colonies. Obviously, the presence of an additional amount in the denominator affects the time of probability calculation, especially with a large number of colonies, and another controlled parameter complicates the configuration of the algorithm. Therefore, the choice between formulas (8), (11) should be based on the conditions of a particular problem and taking into account its dimension.
5. Routing management (step 6 in Fig. 1).
Finding the shortest path between a pair of points is an NP-hard problem that requires listing all possible routes. In addition, most users today need not only routes with the fewest hops to the destination, but also routes that can meet other important needs. Such users often need to provide support for QoS [19, 20] and to be able to take into account the energy component [13, 15, 21-24] due to the fact that in special-purpose networks there may be a significant number of nodes running on batteries, taking into account the speed of the communication channel, the delay time between the sender of the packet and its recipient, the number of available routes and the reliability of packet delivery by the appropriate route.
The general structure of the proposed routing procedure consists of four main components [20], such as route support system, route search system, IP packet routing decision-making system and memory system with which all the above systems interact.
The proposed procedure uses a combination of fuzzy logic (FL) algorithm [12-15, 19, 21, 25-31] and ant colony system (ACS) [18, 20, 22, 31-34] to find the optimal route between a pair of NS/ND nodes. The optimal route refers to a route that satisfies all the desired parameters necessary to select the best route. Such parameters are: "QoS", "channel speed", "packet delivery reliability", "energy component", "End to End Delay" and "number of available routes" (Fig. 2).
The main steps of the algorithm for determining the sending of an IP packet to the destination node routing procedure in military networks with the possibility of self-organization are:
- Step 1. Collect node status data in the network to the node status cache in the network.
- Step 2. Receive a request to send a packet to the destination node.
- Step 3. Check the availability of the route to the destination node. If there is no route in the routing table, the
route search system searches for the route to the destination node (step 4).
- Step 4. The route search system executes the route search request.
- Step 5. If you receive a response to the route request, the route is recorded to the node status cache in the network.
- Step 6. Fuzzification and defuzzification of route indicators.
- Step 7. The route is searched.
- Step 8. Forming a database of routes.
- Step 9. The decision-making system for sending IP packets based on the available routes in the database of routes decides to send the IP packet by the appropriate route to the destination node based on QoS.
- Step 10. Send the IP packet to the destination node.
MDSR receives all packets and reads the sender's IP address and MAC from them, which allows you to populate the ARP table. This reduces the overhead of maintaining the ARP protocol.
The fuzzy neural network (FNN) proposed for routing consists of five layers: linear transmission function, fuzzification, "yes" operation, fuzzy inference and defuzzification.
Layer 1. The function of linear transmission is obtaining indicators of nodes in the network of special-purpose parameters from the received IP packets such as information transmission rate, time of packet transmission to the destination node, node battery charge level, IP packet delivery reliability.
The indicator of information transmission rate Pspeed is the minimum speed of radio communication among nodes from the whole route, so
(12)
Fig. 2. Description of the routing procedure in military networks with the possibility of self-organization
where Vij is the node involved in the transmission of the packet on the route ij.
The battery charge indicator also determines the minimum battery charge on the node that is involved in the route
Ppwer = minK
(13)
The packet delivery delay is the sum of the IP packet delivery time of all intermediate nodes and thus shows the time of packet delivery to the destination node on the route as a whole
P =Vy.
delay iiekt ■
(14)
The indicator of IP packet transmission reliability is the probabilistic indicator of packet transmission along the entire route
-=nn.
reiabihty ' ± lability "
(15)
Layer 2. The process of fuzzification for the transition from a clear value of parameters to a fuzzy value of some linguistic variable. To achieve the adaptability of the routing protocol to changes in the network, the minimum and maximum values of the parameters of the database state of the nodes are taken into account.
S W = 5 (i jt )'
where
The dynamic routing protocol of DSR was taken as a basis in the specified work [30].
MDSR unlike standard DSR has been designed to support traffic priority (QoS). MDSR uses IPv6, which significantly increases the address space, and while building a network allows you not to use DHCP to automatically assign IP addresses or manually configure the IP address. The use of IPv6 in modern conditions allows the rapid deployment of a special-purpose network.
0 < q < 1, 0 = min Pped, 1 = max , (16)
S ïr„„ = P j )' where
0 < q < 1, 0 = min P , 1 = max P , (17)
1 ' power' power '
where
0 < q < 1, 0 = min Pdeay, 1 = max P^,
1 ■■ = S (i, j, t ),
^reliability V '■" /'
where
0 < q < l, 0 = min pMlli¥, 1 = max prdaMliy.
(18)
(19)
Each node of this layer represents one term of the membership function. Membership functions for all four parameters are constructed according to the equations:
^Low ( X ) = maX I 0min ( 1
A-x
(20)
the membership function determines the weak and medium values of the parameter
\y(k, x ) = i
0,min
x-A-(k-1) A- (k + 1)-x'
A , A
(21)
^ High (x ) = min
1,max
0,
x-( N - 1)A
(22)
1
where N=3, A^, ^(1, X) = ^Weak (X)> X) = ^Medium (X).
The construction of membership functions that determine the overall metric of the route is the level of phero-mones that the ant will leave after each pass, will look like:
^rn (x ) = max I 0,min I 1,
A-x
\y(k, x ) = i
^ Phi3 (x ) = mln
0,min 1,max
x-A(k-1) A(k + 1)-x
0,
A A
x-( N - 1)AV
(23)
(24)
(25)
ge N=12;
1
A = —; x) = \ipi2 (x) ц(2,x) = ^ph3 (x),
= (X) X) = ^Ph5 (X) X)=^Ph6 (x)
x) = ^Phi(x) x) = ^Pks(-4 X) = ^Ph9 (x)
x)=^pk10 (x)- X) = ^PhH (x) x) = ^phi2 (x)-
^(12> *)=IVl3 (*)
are the pheromone level functions.
Layer 3. Each fuzzy system is implemented in the form of fuzzy rules. Fuzzy rules perform logical "yes" or "or" operations. This network layer has the number of nodes corresponding to the number of "and" operations. So for a complete search of 4 parameters, each of which has 4 terms, you need 256 neurons that correspond to all possible variations of the terms of the parameters.
if Pspeed is Ax and Ppower is Bx and Pdelay Cx and Preliability Dx so,
where Ax, Bx, Cx, Dx are the membership functions that are defined according to Pspeed, Ppower, Pde/ay, Pre/iabi/ity. That is, at the input of the neuron of the third layer will have the form:
If I4 is Low and I2 is Low and I3 is High and I4 is Low then.
(27)
the membership function that determines the high value of the parameter
At the output of the neuron of the third layer, the aggregation of the preconditions of fuzzy rules is carried out and is determined by the expression, which is a logical conjunction,
if Mg = M (Pspeed n Ppower n Pdelay n Preliability ), then: 11 g = min
Pspeed )' ^ ppower )' ^ (Pdelay )' ^ (p'reliability )} *
(28)
Layer 4. Activation of the inference of the fuzzy rule is carried out. At the fourth level, a specific output is determined on each of the corresponding input combinations that were at the input. So, for example, the neuron of the fourth layer will look like
If Ii is Low and I2 is Low and
I3 is High and I4 is Low then O is Phi.
Layer 5. The fuzzy result, which is the result of inference, is converted into a real value that can be used as a control input. Since the desired output is an indistinct result, the quantitative value of the control output is determined by defuzzifi-cation. The procedure uses the center of gravity method. The definition of the center of gravity is calculated by expression
y = J
J xi ■^(x)-dx J |i(x)-dx
(29)
where y is the result of defuzzification, x is the initial linguistic variable ra, |(x) is the membership function of the fuzzy set that corresponds to the original variable ra after the accumulation step, min, max are the right and left point of the interval of the carrier of the fuzzy set of the output variable ra.
Layer 6. The function of neuronal activation is often a continuous and nonlinear function, which is called sigmoid function and is defined as
f ( - ) =
1
1 + exp (ax2 )'
(30)
where a is the constant and a > 0.
The route search procedure based on fuzzy logic and an ant colony system has the following steps:
Step 1. Initia/ization. It consists of the initial values of the algorithm parameters, such as the number of ants, pher-omone evaporation rate, data rate, battery charge, packet transmission time, packet transmission reliability.
Step 2. Initia/ exposure of ants. At this stage, the ants are located at the starting points from which the iteration will take place. Active ant refers to an ant that has not yet arrived at its destination and is not blocked at the tops (nodes). Because each ant can pass each vertex (node) once in each iteration, the ant is
blocked at the junction when it has no chance to continue transition to its destination and has no possible way to move back.
Step 3. Construction of probable routes. At this stage, the probability of each possible direct route is calculated based on its cost function for each active ant. The probabilistic transition of ants among nodes can also be specified as a node transition rule. The probability of transition of the k-th ant from node i to node j is given by:
P =
1httabu,, ) )
0,
j itabuk,
otherwise,
(31)
where Tij and nij are the pheromone intensity and cost of the route between nodes i and j, respectively. The relative values Tj and nj are controlled by the parameters a and P respectively. tabuk is the list of unavailable routes (visited nodes) for the ant k.
Step 4. Selection of a route. The random parameter 0 < q < 1 with the same probability is compared with the parameter Q, where 0 < Q < 1. The result of the comparison between Q and q takes one of two methods to select the active ant route of the next transition as follows:
i pk )
q > Q,
I arg max ( roulette wheel ( pkh ) otherwise.
(32)
t -r = xf + (10 XAT),
(33)
where At is the number of local pheromone update. The value At is the FL inference system.
The temporary route cache contains the routing information required for the node. The knowledge base stores all studied routes with indicators of residual battery charge, data transmission rate, route delay time, route reliability, route load and number of relays (hops). The database is populated by studying route information from data packets and route request packets.
Based on the knowledge base, a routing table is formed.
The cost of the route is formed using fuzzy logic, using a modified algorithm of ant colonies, the search for the best route is performed, and then the found routes are recorded in the routing table. No more than four available routes are recorded in the routing table. In case of exceeding the number of routes
to the destination node, the best four routes are selected by ranking. The presence of several routes in the routing table allows you to balance the load of routes.
6. Selection of the operating mode.
It is proposed to use the energy and frequency component of the use of system resources (their efficiency) to select the operating mode of the RCD. The boundaries between energy and frequency efficiency do not meet the requirements for changing the operating mode, so to clarify it is proposed to introduce an additional indicator, namely the importance of the radioelectronic environment (REE).
Convolution of partial quality criteria to general is carried out using a certain scheme of compromises, which determines the specific principle of optimality
Fopt = max F (Im-ߣ C)-
(35)
If q is larger than Q, the active ant chooses the route with the highest probability, otherwise the roulette wheel rule is selected to select the next transition through the probabilities.
Step 5. Updating of the taboo list. At this stage, the route (selected node) that was selected by the ant k is added to the list in the table. This direction will not be re-selected and its probability is no longer calculated.
If the ant k has reached its destination or has been blocked at the top (node), this step deactivates the ant blocked or arrived in the current iteration.
Step 6. Updating of the pheromone. The ACS pheromone system consists of two basic rules: the first is applied while building solutions (local pheromone update rule), and the second rule is applied after all the ants have finished building the solution (global pheromone update rule). The sum of the pheromones of the route between the transitions i and j is updated for the k-th ant as:
where Fopt is the radio communication device mode, Im is the coefficient of importance of the electronic environment.
According to [13-16, 21], the importance of REE indicators can be considered as a non-metric criterion of usefulness (NCU).
Hybrid modes of operation based on multi-antenna systems are selected as operating modes, namely:
- MIMO-OFDM (Multiple-Input Multiple-Output with Orthogonal Frequency Division Multiplexing);
- MIMO-UWB (Multiple-Input Multiple-Output with Ultra-Wideband Signal);
- MIMO-FHSS (Multiple-Input Multiple-Output with Frequency-Hopping Spread Spectrum).
Non-metric partial utility criteria (NPUC), which should characterize the operating mode is the frequency efficiency of RCD (PF); bandwidth, the degree of use of radio frequency resources by the RCS devices. We present the main NPUC using quantitative characteristics (Table 3).
Table 3
NPUC for selection of the RCD operating mode
NPUC Quantitative characteristics of the indicator Areas of change in indicators Indicators taken into account while determining the importance of REE
ßE Energy efficiency of the RCD 0.1-0.4 MIMO-OFDM
0.401-0.79 MIMO-UWB
0.801-1.0 MIMO- FHSS
C Bandwidth 0.81-1.0 MIMO-OFDM
0.41-0.79 MIMO-UWB
0.1-0.4 MIMO-FHSS
Xres Degree of use of radio frequency resources by the RES devices 0.1-0.8 Interference in part of the lane
0.801-1 Obstructive barriers
Im REE importance 0.1-0.4 Low
0.401-0.79 Middle
0.801-1.0 High
7. Selection of signal parameters for the operating mode.
For each of the modes, rational values of the signal parameters, where the initial input of the RCD and the communication channel parameters, rational values of the parameters for each of the modes are selected, as indicated in [25, 26].
6. Discussion of the results of developing the method
for adaptive control of military radio network parameters
It is proposed to use the method of adaptive control of military radio network parameters. The simulation of the proposed method was carried out in the Mathcad and MathCad 2014 software environment. Evaluation of the method was carried out using simulation and measuring tools that simulated the RES.
Simulation of channel resources management was performed with the following parameters:
- radio communication devices with the pseudo-random tuning of the operating frequency (PTOF): frequency range is 30-512 MHz; transmitter power is 10 W; radiated frequency bandwidth - 12.5 kHz, receiver sensitivity - 110 dB; the number of PTOF in the network - 4; the number of frequency channels for reconfiguration - 10,000; the amount of adjustment - 333.5 jumps/sec;
- the number of radioelectronic suppression complexes (RSC) is 4; frequency range is 30-2,000 MHz; transmitter power is 2,000 W; maximum frequency band that can be suppressed is 80 MHz; the number of radio lines with PTOF that can be suppressed at the same time is 4, the type of interference is the noise obstruction with frequency manipulation, as one of the most common and the impact of which is well known; the strategy of the RSC complex is dynamic.
4 programmable LimeSDR transceivers (USA) with GNU radio software (Germany) were connected to the PC and the RIGOL DG5252 noise generator (Germany), which simulated the operation of the RES complex.
To test the effectiveness of the proposed method, we assume that the operating time of the programmable radio communication device with the PTOF on the same frequency is the same as the RES complex.
At this stage of efficiency evaluation, only the effectiveness of the improved channel-level resource management procedures of the developed method is evaluated, namely the improved procedure for selecting operating frequencies and the advanced procedure for forecasting the electronic environment and the improved procedure for selecting the radio communication mode.
Fig. 3, 4 were obtained by averaging the signal-to-noise ratio on the frequency subchannels.
This advantage is the greater accuracy of estimating the signal-to-noise ratio in the frequency subchannels due to the use of advanced procedures for estimating the electronic environment, the use of the procedure for predicting the law of interference (Fig. 3, 4). This means that the optimal operating frequencies were selected according to the criterion of maximum throughput (which were not suppressed), the optimal signal-code design and operating mode were selected.
Fig. 4 shows the graph of the dependence of the bit error probability on the signal-to-noise ratio (for the case of noise interference in the part of the band with frequency manipulation p=0.5).
10-1
10-
-c
c
sa
sC ss-
<u
PC
10-
10-
f
/ f /
// '
' 1
/ • -- s • / / / / / /
-/-1-
--/ / 1
/ 1
/ f / |
/ / / i
• # i / f 1
# # / / • # # -// 1 1 1
1
-'-/-f- -1-
1
1 1
1 J 1
/ • f / 1 1 i
20 10 0
The developed method
— — - The method [6]
— The method [1]
-The method [4, 5]
---The method [171
Fig. 3. Dependence of the bit error probability on the signal-to-noise ratio for different methods under the influence of fluctuation noise and noise barrier with an overlap coefficient p=1
10-1
10-
p
g
<D
pq
10-
10-
20
15
10
— The developed method
- - - The method [6]
---The method [l7]
-The method [4, 5]
The method [1]
Fig. 4. Graph of the dependence of the bit error probability on the signal-to-noise ratio (for the case of noise interference in the part of the band with frequency manipulation with the overlap coefficient p=0.5)
5
0
Thus, as can be seen from Fig. 4, the gain in energy terms due to advanced procedures averages a bit error probability of 10-3 to 3 dB. It should be noted that the bit error probability of 10-3 is critical for most radio communication devices and in fact leads to disorganization of control and communication systems.
In the following steps, improved channel resource management procedures were not used.
Modeling of network resources management was carried out in the following conditions (Fig. 5-10):
- the number of nodes is 50, the routes are built among 10, 20 and 30 randomly selected pairs of nodes;
- packet size is ln=512 bytes, channel access protocol IEEE 802.11, node speed is a=0...20 m/s;
- the size of the queue at the node is 64 packets, the waiting time of the packet in the queue is twait<30 sec, baud rate in the radio channel is r=1 Mbit/s, the traffic type is data ^=3 (Fig. 5-10).
Evaluation of the computational complexity of the developed algorithm showed that for a given source data and using the processor ADSP-21261 (USA), control of channel and network resources of the radio system can be carried out in real time. It takes into account the delay required to transmit information about these values through the feedback service channel.
An advantage in the range of 10-16 % was obtained during the operational control of the current state and noise situation in the channels that are occupied for transmission, for a time comparable to the duration of the information exchange cycle. The ambiguity in determining the state of the channels is caused by different parameters of the received signal, due to different trajectories of the signal and signal/noise levels in the subchannels.
Fig. 5. Graph of the dependence of the pheromone level on the time of packet delivery to the recipient to the packet delivery
reliability
Fig. 6. Graph of the dependence of the pheromone level on the data rate to the packet delivery reliability
Fig. 7. Graph of the dependence of the pheromone level on the data rate to the packet delivery time
Fig. 8. Graph of the reliability of the packet delivery to the battery level
Fig. 9. Graph of the dependence of the pheromone level on the delivery time of the destination packet to the battery level
Fig. 10. Graph of the dependence of the pheromone level on the data rate to the battery level
The main advantages of the proposed method are:
- unambiguity of the obtained results;
- forecasting the state of the radioelectronic environment;
- reduction of time of package delivery to users;
- wide scope of use (data transmission systems, civil and special-purpose radio communication systems);
- simplicity of mathematical calculations;
- ability to adapt the system during the operation;
- possibility of synthesizing the optimal structure of the decision support system;
- increase in the efficiency of radio frequency resource use;
- possibility of RCD operation in conditions of frequency range deficit;
- taking into account the impact of the main types of intentional interference;
- ability to work at low signal/noise ratios in the channel;
- possibility of providing frequency-territorial planning of the radio communication devices use;
- ability to determine the optimal location of radio communications, taking into account the zones of electronic suppression;
- ability to determine the optimal route for information transmission, taking into account the zones of electronic suppression;
- ability to determine the optimal operating mode of the radio to maximize the radio bandwidth;
The disadvantages of the proposed method include:
- loss of informativeness in the assessment (forecasting) due to the construction of the membership function during the procedures of fuzzification/defuzzification of the input parameters (transition from clear to fuzzy evaluation and vice versa). This loss of informativeness can be reduced by choosing the type of membership function and its parameters in the practical implementation of the proposed method. The choice of the type of membership function depends on the computing resources of a particular electronic computing device;
- lower accuracy of assessment on a single parameter of condition assessment;
- loss of results accuracy during the restructuring of the architecture of the artificial neural network.
This research is a further development of research conducted by the authors, aimed at developing the theoretical foundations for improving the efficiency of military radio systems published earlier [1, 2, 17, 18, 20, 27-32].
Areas of further research should be aimed at reducing computational costs in the processing of various data types in special-purpose systems.
7. Conclusions
1. The problem of channel and network resources management is set. This formalization allows us to describe the processes that take place at each level of the military radio network. In the course of setting the problem of managing channel and network resources, a description of the processes occurring in military radio communication systems was made. The bandwidth of the military radio communication system was chosen as a criterion for the effectiveness of this method.
2. It is proposed to use the method of adaptive control of military radio network parameters, which realizes:
- the choice of operating frequencies of radio communication devices taking into account the strategy of electronic warfare;
- rational network topology. The procedure for selecting the topology of the military radio communication system is based on the method of an ant multi-colony system. The main idea of the new option of ant colony optimization is that instead of one colony of the traditional ant algorithm, several colonies are used that work together in a common search
space. Thus, each colony on the basis of the mechanism of a stigmergy solves the subtask, forming the part in the joint decision. However, this procedure additionally takes into account the type of a priori uncertainty and the evaporation coefficient of the level of pheromones;
- rational route of information transmission. The proposed procedure is based on an improved DSR algorithm;
- the operating mode of radio communication devices taking into account the capacity of the military radio communication system.
This is achieved through improved procedures for controlling the parameters of military radio networks.
3. The gain in the range of 10-16 % was obtained during the operational control of the current state and noise situation in the channels occupied for transmission, for a time comparable to the duration of the information exchange cycle. The ambiguity in determining the state of the channels is caused by different parameters of the received signal, due to different trajectories of the signal and signal/noise levels in the subchannels.
References
1. Bashkyrov, O. M., Kostyna, O. M., Shyshatskyi, A. V. (2015). Rozvytok intehrovanykh system zviazku ta peredachi danykh dlia potreb Zbroinykh Syl. Ozbroiennia ta viyskova tekhnika, 1, 35-39.
2. Kalantaievska, S., Pievtsov, H., Kuvshynov, O., Shyshatskyi, A., Yarosh, S., Gatsenko, S. et. al. (2018). Method of integral estimation of channel state in the multiantenna radio communication systems. Eastern-European Journal of Enterprise Technologies, 5 (9 (95)), 60-76. doi: https://doi.org/10.15587/1729-4061.2018.144085
3. Sliusar, V. I., Zinchenko, A. O., Zinchenko, K. A. (2015). The GSM standard mobile telecommunication system for airspace radar control needs. Suchasni informatsiyni tekhnolohiyi u sferi bezpeky ta oborony, 2 (23), 108-114.
4. Sliusar, I. I., Sliusar, V. I., Smoliar, V. H., Omarov, M. I., Khomenko, R. V. (2016). Shliakhy udoskonalennia system trankinhovoho zviazku Ukrainy. Modern information system and technologies, 5, 36-47.
5. Jalil Piran, M., Pham, Q.-V., Islam, S. M. R., Cho, S., Bae, B., Suh, D. Y., Han, Z. (2020). Multimedia communication over cognitive radio networks from QoS/QoE perspective: A comprehensive survey. Journal of Network and Computer Applications, 172, 102759. doi: https://doi.org/10.1016/j.jnca.2020.102759
6. Khan, M. W., Zeeshan, M. (2019). QoS-based dynamic channel selection algorithm for cognitive radio based smart grid communication network. Ad Hoc Networks, 87, 61-75. doi: https://doi.org/10.1016/j.adhoc.2018.11.007
7. Majumder, T., Mishra, R. K., Singh, S. S., Sahu, P. K. (2020). Robust congestion control in cognitive radio network using event-triggered sliding mode based on reaching laws. Journal of the Franklin Institute, 357 (11), 7399-7422. doi: https:// doi.org/10.1016/j.jfranklin.2020.05.019
8. Lin, Y.-C., Shih, Z.-S. (2018). Design and simulation of a radio spectrum monitoring system with a software-defined network. Computers & Electrical Engineering, 68, 271-285. doi: https://doi.org/10.1016/j.compeleceng.2018.03.043
9. Rharras, A. E., Saber, M., Chehri, A., Saadane, R., Hakem, N., Jeon, G. (2020). Optimization of Spectrum Utilization Parameters in Cognitive Radio Using Genetic Algorithm. Procedia Computer Science, 176, 2466-2475. doi: https://doi.org/10.1016/ j.procs.2020.09.328
10. Tanerguijlu, T., Kara§an, O. E., Akgun, I., Kara^an, E. (2019). Radio communications interdiction problem under deterministic and probabilistic jamming. Computers & Operations Research, 107, 200-217. doi: https://doi.org/10.1016/j.cor.2019.03.013
11. Kumar, S., Singh, A. K. (2018). A localized algorithm for clustering in cognitive radio networks. Journal of King Saud University -Computer and Information Sciences. doi: https://doi.org/10.1016/jjksuci.2018.04.004
12. Kaur, A., Kumar, K. (2020). Intelligent spectrum management based on reinforcement learning schemes in cooperative cognitive radio networks. Physical Communication, 43. doi: https://doi.org/10.1016/jj.phycom.2020.101226
13. Onumanyi, A. J., Abu-Mahfouz, A. M., Hancke, G. P. (2021). Amplitude quantization method for autonomous threshold estimation in self-reconfigurable cognitive radio systems. Physical Communication, 44. doi: https://doi.org/10.1016/jj.phycom.2020.101256
14. Bodyanskiy, E., Strukov, V., Uzlov, D. (2017). Generalized metrics in the problem of analysis of multidimensional data with different scales. Zbirnyk naukovykh prats Kharkivskoho universytetu Povitrianykh Syl, 3, 98-101.
15. Tymchuk, S. (2017). Methods of Complex Data Processing from Technical Means of Monitoring. Traektoria Nauki. Path of Science, 3 (3), 4.1-4.9. doi: https://doi.org/10.22178/pos.20-4
16. Shyshatskyi, A., Sova, O., Zhuravskyi, Y., Zhyvotovskyi, R., Lyashenko, A., Cherniak, O. et. al. (2020). Development of resource distribution model of automated control system of special purpose in conditions of insufficiency of information on operational development. Technology audit and production reserves, 1 (2 (51)), 35-39. doi: https://doi.org/10.15587/2312-8372.2020.198082
17. Kuchuk, N., Mohammed, A. S., Shyshatskyi, A., Nalapko, O. (2019). The method of improving the efficiency of routes selection in networks of connection with the possibility of self-organization. International Journal of Advanced Trends in Computer Science and Engineering, 8 (1.2), 1-6. Available at: http://www.warse.org/IJATCSE/static/pdf/file/ijatcse01812sl2019.pdf
18. Jin, J., Xie, H., Hu, J., Yin, W.-Y. (2014). Characterization of anti-jamming effect on the Joint Tactical Information Distribution System (JTIDS) operating in complicated electromagnetic environment. 2014 International Symposium on Electromagnetic Compatibility. doi: https://doi.org/10.1109/emceurope.2014.6931048
19. Pievtsov, H., Turinskyi, O., Zhyvotovskyi, R., Sova, O., Zvieriev, O., Lanetskii, B., Shyshatskyi, A. (2020). Development of an advanced method of finding solutions for neuro-fuzzy expert systems of analysis of the radioelectronic situation. EUREKA: Physics and Engineering, 4, 78-89. doi: https://doi.org/10.21303/2461-4262.2020.001353
20. Liu, F., Marcellin, M. W., Goodman, N. A., Bilgin, A. (2013). Compressive detection of frequency-hopping spread spectrum signals. Compressive Sensing II. doi: https://doi.org/10.1117/12.2015969
21. Koshlan, A., Salnikova, O., Chekhovska, M., Zhyvotovskyi, R., Prokopenko, Y., Hurskyi, T. et. al. (2019). Development of an algorithm for complex processing of geospatial data in the special-purpose geoinformation system in conditions of diversity and uncertainty of data. Eastern-European Journal of Enterprise Technologies, 5 (9 (101)), 35-45. doi: https://doi.org/10.15587/ 1729-4061.2019.180197
22. Shmatok, S. O., Podchashynskyi, Yu. O., Shmatok, O. S. (2007). Matematychni ta prohramni zasoby modeliuvannia prystroiv i system upravlinnia. Vykorystannia nechitkykh mnozhyn ta neironnykh merezh. Zhytomyr: ZhDTU, 280.
23. Andrews, J. G. (2005). Interference cancellation for cellular systems: a contemporary overview. IEEE Wireless Communications, 12 (2), 19-29. doi: https://doi.org/10.1109/mwc.2005.1421925
24. Goldsmith, A., Jafar, S. A., Jindal, N., Vishwanath, S. (2003). Capacity limits of MIMO channels. IEEE Journal on Selected Areas in Communications, 21 (5), 684-702. doi: https://doi.org/10.1109/jsac.2003.810294
25. Zuiev, P., Zhyvotovskyi, R., Zvieriev, O., Hatsenko, S., Kuprii, V., Nakonechnyi, O. et. al. (2020). Development of complex methodology of processing heterogeneous data in intelligent decision support systems. Eastern-European Journal of Enterprise Technologies, 4 (9 (106)), 14-23. doi: https://doi.org/10.15587/1729-4061.2020.208554
26. Shyshatskyi, A., Zvieriev, O., Salnikova, O., Demchenko, Ye., Trotsko, O., Neroznak, Ye. (2020). Complex Methods of Processing Different Data in Intellectual Systems for Decision Support System. International Journal of Advanced Trends in Computer Science and Engineering, 9 (4), 5583-5590. doi: https://doi.org/10.30534/ijatcse/2020/206942020
27. Sova, O., Golub, V., Shyshatskyi, A., Ostapchuk, V., Nalapko, O., Zubrytska, H. (2019). Method of Forecasting the Duration of Data Transmission Routes in Mobile Radio Networks. 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON). doi: https://doi.org/10.1109/ukrcon.2019.8879978
28. Makridenko, L. A., Volkov, S. N., Hodnenko, V. P. (2010). Kontseptual'nye voprosy sozdaniya i primeneniya malyh kosmicheskih apparatov. Voprosy elektromehaniki, 114, 15-26.
29. Trotsenko, R. V., Bolotov, M. V. (2014). Data extraction process for heterogeneous sources. Privolzhskiy nauchniy vestnik, 12-1 (40), 52-54.
30. Lei, Z., Yang, P., Zheng, L. (2018). Detection and Frequency Estimation of Frequency Hopping Spread Spectrum Signals Based on Channelized Modulated Wideband Converters. Electronics, 7 (9), 170. doi: https://doi.org/10.3390/electronics7090170
31. Kanaa, A., Sha'ameri, A. Z. (2018). A robust parameter estimation of FHSS signals using time-frequency analysis in a non-cooperative environment. Physical Communication, 26, 9-20. doi: https://doi.org/10.1016/j.phycom.2017.10.013
32. Rotshteyn, A. P. (1999). Intellektual'nye tehnologii identifikatsii: nechetkie mnozhestva, neyronnye seti, geneticheskie algoritmy. Vinnitsa: "UNIVERSUM", 320.
33. Parashchuk, I. B., Ivanov, Yu. N., Romanenko, P. G. (2010). Neyrosetevye metody v zadachah modelirovaniya i analiza effektivnosti funktsionirovaniya setey svyazi. Sankt Peterburg: VAS, 104.
34. Haykin, S. (2006). Neyronnye seti: polnyy kurs. Moscow: Vil'yams, 1104.