Роман Одарченко

ORCID: 0000-0002-7130-1375
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cybersecurity and Information Systems
  • Information Systems and Technology Applications
  • Telecommunications and Broadcasting Technologies
  • Advanced Signal Processing Techniques
  • Advanced Control and Stabilization in Aerospace Systems
  • Software-Defined Networks and 5G
  • Advanced MIMO Systems Optimization
  • Aerospace, Electronics, Mathematical Modeling
  • Wireless Communication Networks Research
  • Network Security and Intrusion Detection
  • Advanced Data Processing Techniques
  • Cooperative Communication and Network Coding
  • UAV Applications and Optimization
  • Advanced Wireless Network Optimization
  • Military Technology and Strategies
  • Energy Efficient Wireless Sensor Networks
  • Advanced Scientific Research Methods
  • Advanced Computational Techniques in Science and Engineering
  • IoT and Edge/Fog Computing
  • Millimeter-Wave Propagation and Modeling
  • Mathematical Control Systems and Analysis
  • IoT Networks and Protocols
  • Advanced Data Compression Techniques
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques

National Aviation University
2015-2024

Baden State Library
2022

Italian Institute of Telemedicine
2020

Color (United States)
2020

Engineering (Italy)
2020

Ministry of Education and Science
2020

National Academy of Sciences of Ukraine
2020

Yessenov University
2020

Center for Information Technology
2020

Defense Systems (United States)
2019

Represented paper is currently topical, because of year on increasing quantity and diversity attacks computer networks that causes significant losses for companies. This work provides abilities such problems solving as: existing methods location anomalies current hazards at networks, statistical consideration, as effective anomaly detection experimental discovery choosed method effectiveness. The network traffic capture analysis during the segment passive monitoring considered in this work....

10.5815/ijcnis.2020.06.01 article EN International Journal of Computer Network and Information Security 2020-12-22

The fifth generation of cellular technologies, 5G, promises to deliver a wide variety services. However, the first release 5G (3GPP Rel-15) did not consider multicast capabilities in system including both access and core networks. This article fills gap by describing solutions for mobile network architecture incorporating broadcast capabilities. Two innovative provision broadcast, based on 3GPP Rel-15 arechitecture, have been proposed analyzed. One is friendly with low imprint over while...

10.1109/tbc.2020.2991548 article EN IEEE Transactions on Broadcasting 2020-05-22

Computing software plays an essential role in almost every sector of the digital age, but process efficient development still faces several challenges. Effective methodology can be difference between success and failure a project. This research aims to evaluate overall impact Agile Software Development (ASD) on individual, organizational, development, project management dimensions. For this purpose, we surveyed professionals from variety backgrounds (experience, location, job ranks) explore...

10.3390/app122110698 article EN cc-by Applied Sciences 2022-10-22

Дане дослідження ґрунтується на припущенні, що в безпосередній близькості від розрахункових координат розташовані транзитні вузли, які розміщені вздовж прямої лінії, з'єднує початковий і кінцевий вузли маршруту. Це припущення є справедливим для мереж із великою щільністю вузлів. Для з обмеженою кількістю вузлів доцільно зосередитися розв'язанні задачі, яка полягає у визначенні необхідної кількості маршруту основі відстаней між ними. Запропонований метод скорочує використання мережевих...

10.18372/2073-4751.80.19778 article UK Problems of Informatization and Management 2025-03-13

The subject of this article is penetration testing methodologies for 5G networks and beyond. aim paper to develop a methodology software automated the network infrastructure next-generation cellular with layered architecture. tasks be solved are as follows: 1) analyze existing methods beyond research in area; 2) new method slices testing; 3) design implement form virtualize environments; 4) test architecture based on open-source solutions experiments conducting; 5) validate solution...

10.32620/reks.2025.1.17 article EN cc-by-nc RADIOELECTRONIC AND COMPUTER SYSTEMS 2025-02-20

This work presents eight demonstrators and one showcase developed within the 5G-Xcast project. They experimentally demonstrate validate key technical enablers for future of media delivery, associated with multicast broadcast communication capabilities in 5th Generation (5G). In 5G-Xcast, three existing testbeds: IRT Munich (Germany), 5GIC Surrey (UK), TUAS Turku (Finland), have been into 5G testing networks, which enables us to our vision a converged infrastructure fixed mobile accesses...

10.1109/tbc.2020.2977546 article EN IEEE Transactions on Broadcasting 2020-03-18

This paper contains approach to security key indicators assessment in modern cellular networks. To improve the of networks it is necessary first analyze existing protection level and create a solution that will data transmission security. The current tools do not separate quality performance for specific services provided by mobile operators. It limits ability control modernization. Based on methodology summary table formulas calculating these was developed presented. provides more...

10.1109/saic.2018.8516889 article EN 2018-10-01

The main purpose of mathematical model building while employing statistical data analysis is to obtain high accuracy approximation within the range observed and sufficient predictive properties. One methods for creating models use techniques regression analysis. Regression usually applies single polynomial functions higher order as approximating curves. Such an approach provides accuracy; however, in many cases, it does not match geometrical structure data, which results unsatisfactory...

10.3390/a15100378 article EN cc-by Algorithms 2022-10-17

The growth of society digitalization increases the requirements for data transmission productivity information telecommunication networks. Traffic in these networks is self-similar. For its modeling a number fractal traffic imitation models were developed. However, modern studies show that characteristics may change wide and be dependent big parameters settings real networks, protocol transmitted information's characteristics, users' behavior. So main aim paper was an investigation to choose...

10.15866/iremos.v10i5.12009 article EN International Review on Modelling and Simulations (IREMOS) 2017-10-31

Cloud computing has the capability of sharing and retrieving data, remote controlling from different locations, that is why many companies organizations implement their businesses on cloud computing. dependent internet there for security environment became a major topic. Service providers must provide to customers; therefore, they need tools techniques protect against any threat. Denial-of-Service (DoS) Distributed (DDoS) attacks are thoughtful due accessibility show property In this paper...

10.1109/msnmc.2018.8576287 article EN 2018-10-01

It is clear that 5G networks have already become integral to our present. However, a significant issue lies in the fact current communication systems are incapable of fully ensuring required quality service and security transmitted data, especially government operate context Internet Things, hostilities, hybrid warfare, cyberwarfare. The use extends critical infrastructure operators special users such as law enforcement, governments, military. Adapting modern cellular meet specific needs...

10.3390/bdcc7040169 article EN cc-by Big Data and Cognitive Computing 2023-10-26

Traffic offload improved method for 4G/5G mobile network was proposed. For this purpose made sociological survey among users of networks in Ukraine. In work shown multilink connectivity usage as possible solution traffic offload. Three scenarios were proposed and then their modeling provided. The efficiency up to 55%.

10.1109/tcset.2018.8336375 article EN 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET) 2018-02-01

In this paper the method of network-centric monitoring cyberincidents was developed, which is based on concept and implements in 8 stages.This allows to determine most important objects for protection, predict category cyberincidents, will arise as a result cyberattack, their level criticality.

10.5815/ijcnis.2017.06.04 article EN International Journal of Computer Network and Information Security 2017-06-04

The paper deals with analysis of the principle applying additional radar data, which allows to obtain accurate evaluation trajectory parameters vector, that will be slightly impaired by use aerial vehicle data.

10.1109/msnmc.2016.7783101 article EN 2016-10-01

Computer networks and internet application are growing fast, so data security is the challenging issue of today that touches many areas (particularly in aviation). To prevent unauthorized access to user or database, any transmitting process should be securely encrypted. Aviation critical area its criticality amplifies by strong communication between both on ground motion objects. The goals this paper are: (1) introduce new hybrid cryptographic algorithm model using combination two algorithms...

10.1109/msnmc.2018.8576289 article EN 2018-10-01

5G-Xcast is a project focused on Broadcast and Multicast Communication Enablers For the Fifth Generation of Wireless Systems. Within for most defined use cases, it necessary to provide needed throughput, delay reliability. this purpose, multi-connectivity approach can be used. 5G one key enablers in order satisfy demanding requirements mobile networks. Multilink kind within project. This paper describes multilink benefits, its high-level description implementation core architecture better...

10.1109/infocommst.2018.8631901 article EN 2018-10-01

Was proposed improved method for routing group unmanned aerial vehicles as of communication channels at what a metric selected two alternatives: and speed data. The model determining effective bandwidth, which is based on using both subchannels various modulation schemes in the MIMO systems channels. results calculations simulations confirm high efficiency method.

10.1109/apuavd.2015.7346624 article EN 2015-10-01

Використання сучасних технологічних рішень для побудови радіо мереж різного призначення є Сьогодні більшість постачальників телекомунікаційних послуг зацікавлені в тому, щоб клієнти були задоволені послугами, які їм надаються. Очевидно, що користувачі певної послуги будуть і надалі обирати одного того ж провайдера, якщо їх очікування якості виправдалися. Тому, задовольняти клієнтів, провайдерам необхідно постійно вимірювати поточний рівень послуг, вони надають. Для надання найкращої...

10.18372/2310-5461.56.17130 article UK Science-based technologies 2023-01-31

5G mobile networks are designed to fulfill very stringent requirements and support new vertical use cases. This transition a oriented delivery model will have strong impact in the touristic sector. In this context, “touristic city node” of 5G-TOURS, built Turin, aims at exploiting potential media vertical. The objective is develop an innovative tourism concept based on complementary linked trials for five specific promote overall integrated indoor/outdoor immersive experience visitors using...

10.1109/gcwkshps50303.2020.9367418 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2020-12-01

One of the most promising technologies nowadays are sensor networks, which basically depend on wireless networks to interact. However, signal interference represents a limitation for this technology. Accordingly, in paper clustering technique is proposed improve ZigBee, Bluetooth, and WI-FI networking standers eliminate as much possible.

10.15866/irecap.v7i1.10911 article EN International Journal on Communications Antenna and Propagation (IRECAP) 2017-02-28

The paper deals with research of energy characteristics multilevel modulation techniques for modern broadband radio systems. problems modeling and analysis digital data transmission channel are considered.

10.1109/iceait.2016.7500991 article EN 2016-05-01
Coming Soon ...