2022
Постійне посилання на фонд
Переглянути
Перегляд 2022 за Дата публікації
Зараз показуємо 1 - 17 з 17
Результатів на сторінці
Налаштування сортування
Документ Відкритий доступ Сomprehensive method of energy-efficient workload processing in the information and communication network(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Prokopets, Nataliia; Globa, LarysaBackground. Peculiarities of the workload in a modern information and communication network (ICN) determine specific requirements for energy efficiency, performance and availability of its processing system. Existing approaches to increase en ergy efficiency and performance of workload processing do not take into account the possibility of dynamic changes in ICN workload arrival rate and individual energy consumption characteristics of computing nodes of the system. Objective. The purpose of the paper is to increase the energy efficiency and performance of ICN workload processing while meeting the requirements for the availability of the processing system, taking into account dynamic changes in the input workload arrival rate and the individual characteristics of the computing nodes’ energy consumption. Methods. A mathematical model of the workload processing system was built using the queueing theory methods, and an ontological model of this system was built using intelligent data analysis methods, which made it possible to quantitatively and qualitatively describe the complex relationships between system parameters and workload processing efficiency indicators. On the basis of the built models, a comprehensive method of energy-efficient workload processing was proposed, which differs from the known ones by the use of individual energy consumption models of computing nodes, combining the advantages of horizontal scaling and energy-efficient scheduling taking into account dynamic changes in workload arrival rate. Results. The efficiency of ICN workload processing is increased by 15.722% according to the efficiency criterion, which includes energy efficiency and performance indicators, compared to the known energy-efficient Backfill approach while meet ing the requirements for the availability of the processing system. Conclusions. The energy efficiency, performance and availability of the ICN workload processing system can be improved by combining horizontal scaling and energy-efficient scheduling approaches using individual energy consumption models of computing nodes and taking into account dynamic changes in the input workload arrival rate.Документ Відкритий доступ Uniform rectangular array radar optimization for efficient and accurate estimation of target parameters(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Romanuke, VadimBackground. If the intensity of moving targets within a surveyed area is low, some sensors of the uniform rectangular array (URA) radar can be (symmetrically) turned off. However, this does not guarantee detection of any target because sometimes the threshold detection, by which the main parameters of the target are estimated, fails. Objective. In order to improve detection of ground-surface targets, the goal is to find an optimal number of URA radar sensors along with improving the stage of threshold detection. The criterion is to determine such a minimum of these sensors at which the main parameters of the target are accurately estimated. In addition, the threshold detection is to be modified so that a number of detection fails would be lesser. Methods. To achieve the said goal, the URA radar is simulated to detect a single target. The simulation is configured and carried out by using MATLAB® R2021b Phased Array System ToolboxTM functions based on a model of the monostatic radar. Results. There is a set of quasioptimal URA sizes included minimally-sized and maximally-sized URAs. The best decision is to use, at the first stage, the minimally-sized URA (by turning off the maximal number of vertical and horizontal sensors). If the detection fails, then the maximally-sized URA radar is tried. If the detection fails again, the next minimally-sized URA is tried, in which one horizontal sensor is additionally turned on. Additional horizontal sensors must be enabled while the detection fails but the number of vertical sensors should not be greater by about a third of their minimal number. Conclusions. An optimal number of URA radar sensors is in either the minimally-sized URA (or close to it) or maximallysized U RA ( or c lose t o i t). The U RA s ize i s r egulated b y ( symmetrically) turning off vertical and horizontal sensors. The threshold detection stage is modified so that the threshold is gradually decreased while the detection fails. This allows increasing a number of detected targets on average, which is equivalent to increasing the probability of detection.Документ Відкритий доступ Method of operational calculation of coordinates of intermediate route points of flying information robot(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Lysenko, Olexandr; Valuiskyi, Stanislav; Yavisya, Valerii; Tachinina, Olena; Novikov, Valery; Sushin, IhorBackground. The article describes an operational calculation method of the intermediate points' coordinates of the flying information robot (FIR) route, which collects information from mobile sensors of a mobile wireless sensor network. Objective. The purpose of the paper is to develop a method that allows building the movement trajectory of the LIR, minimizing the time for collecting information from mobile sensors. Methods. The quickly calculating method of the route' coordinates of intermediate points involves setting a quasi-mobile mode of sensors movement and the consistent use of algorithms for solving the navigation problem, the clustering problem, and the problem of finding the flying trajectory around information collection points from mobile sensors clusters that formed at the time of the start of collecting information. Results. A method has been developed that uses the procedures of quantitative calculation of the indicators of the structural-information connectivity of wireless sensor networks with mobile sensors. These indicators take into account the presence of not only a structural connection, but also a guaranteed information exchange between a given sender-destination pair. Conclusions. The developed method makes it possible to improve the indicators of the structural-information connectivity of wireless sensor networks with mobile sensors: k-connectivity and network bandwidth.Документ Відкритий доступ Static and dynamic assessments of information signs in recognition of sources and objects of observation in the process of radio monitoring(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Ilnytskyi, Аnatoliy; Tsukanov, OlegBackground. The current state and problems of the surveillance and radio monitoring systems of Ukraine require fundamentally new approaches to increasing their efficiency and the level of informatization. At the same time, the informatization of the radio monitoring system should be understood as the process of implementation and application in various areas of their activity of methods and means of collecting, transmitting, processing, saving and using information in order to increase the effectiveness of conducting radio monitoring and meet the needs of national security based on the formation and use of information resources. Objective. The purpose of the paper is to increase the effectiveness of radio monitoring by using the calculation of estimates of dynamic and static informational features when recognizing sources and objects of radio radiation and determining their phase (operational) state and level of possible danger. Methods. Recognition is based on the method of least squares by calculating the degree of "similarity" (similarity coefficient) of the recognized object with objects whose classes are known. Both the researched and reference objects are presented as a set of values of informational features of various nature, some of which are unchanged over the entire period of observation, that is, static, while others change dynamically. Results. The structure of the automated system of classification and recognition of surveillance objects and the recognition algorithm based on the calculation of static and dynamic information features and the similarity coefficient are proposed. Conclusions. A distinctive feature of deciding whether an object or a source of information belongs to one or another class feature is the calculation of the degree of "similarity" (similarity coefficient) of the recognized object to objects whose classes are known. To eliminate recognition errors associated with a violation of the synchronicity of measurements of the values of dynamic informational features of reference objects and objects to be recognized, a calculation is required taking into account possible time shifts.Документ Відкритий доступ Heuristic algorithms for finding the minimum Steiner tree in the problem of optimizing the deployment and motion control of several flying information and telecommunication robots(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Lysenko, Olexandr; Valuiskyi, Stanislav; Novikov, Valeriy; Sushyn, Ihor; Chumachenko, Serhii; Guida, OleksandrBackground. The article explores the problem of combining the motion control of existing FITRs and the deployment of new FITRs so that the number of new FITRs deployed to support the communication of terrestrial subscribers can be minimized. This problem is formulated as the Steiner Minimum Tree Problem (SMT) with existing mobile Steiner points with a constraint on the edges length of the network graph. Objective. Improve the mathematical model for ensuring the connectivity of episodic radio networks using FITRs and improve the algorithms for providing the connectivity of episodic radio networks using FITRs. Methods. The two algorithms (deploying new FITRs before moving existing FITRs, and moving existing FITRs before deployment of new FITRs) separate the problem and solve the deployment problem, the movement one after the other. In contrast, the algorithm for deploying new FITRs while moving existing FITRs optimizes the deployment problem and the control of movement across and solves these two problems simultaneously. Results. A proposed method includes three heuristic algorithms for placing new FITRs, taking into account the movement of existing FITRs (that is, considering scenarios for moving existing FITRs: deploying new FITRs before, after, or during the movement of existing FITRs) for the SMT problem with existing mobile Steiner points with a constraint on the edges length of the network graph. Conclusions. Evaluation of the effectiveness of the proposed algorithms in various scenarios shows that algorithms taking into account the movement of existing FITRs are always more efficient (in terms of the number of newly added FITRs) than an algorithm without taking into account the movement of existing FITRs.Документ Відкритий доступ New Barker’s composite codes as modulation signals in broadband communication systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Maksymov, Volodymyr; Noskov, Vyacheslav; Khrapovytsky, IgorBackground. Currently noise-like signals (NLS) are widely used and provide high level of jamming immunity and security in broadband communication systems (BСS) when transmitting confidential information in an open radio channel, especially in emergencies. Increasing the efficiency of the NLS is possible when using more advanced code structures. Objective. The purpose of this research is to study new Barker’s composite codes as modulation signals in broadband communication systems. Method. Simulation modeling based on MatLab software package and analytical calculation methods are used. Results. Modeling in the MatLab software package showed the possibility for using new Barker’s composite codes as modulation signals in direct spread spectrum systems but efficiency depends on code words length as well as type synchronization signal. Conclusions. Analysis of research results shows that the new Barker composite codes 21a, 33a, 49, 77a, 121 can be effectively used as modulation code words in broadband systems with direct spectrum expansion.Документ Відкритий доступ Terahertz communication systems for high-definition and ultra-high-definition television transmission(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Avdieienko, Hlib; Slyvka, Andrii; Dykyi, OleksiiДокумент Відкритий доступ Evaluation of the multipath effect on the quality of radio communication in the technological range IEEE 802.11xx(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Uryvsky, Leonid; Solianikova, ValeriiaBackground. As a result of the rays’ reflection from buildings, from the surface of the Earth or from horizontal boundaries between different layers of the atmosphere, occur multipath effects that cause fast fading, which degrades the quality of service. Objective. The purpose of the paper is to determine the multipath effect on the signal-to-noise ratio in a wireless communication channel. Compare the results obtained for a communication channel at operating frequencies of the IEEE 802.11xx standard: 5 GHz and 2.4 GHz. Methods. The useful signal powers and the total interference powers for a communication channel with multipath are calculated. The signal-to-noise ratio for such a channel is compared at operating frequencies of 5 GHz and 2.4 GHz. Results. The results of the study showed that the higher the frequency of the carrier of the wireless radio link, the less pronounced the effect of multipath is. The frequency rating significantly affects the quality of communication in multipath conditions. In this case, lowering the frequency significantly improves the reception condition outside of multipath effect. However, it deteriorates significantly due to the effects of rays reflected from the Earth's surface. In the considered case, the useful signal power in the 2.4 GHz band is 4.2 times higher; at the same time, the power of reflected interference is 19 times higher than in the 5 GHz band. Conclusions. Suggested model makes it possible to determine the effect of interference power in the ranges traditionally assigned in IEEE 802.11xx technology, specifically 2.4 GHz and 5 GHz.Документ Відкритий доступ New composite Barker codes, Gold codes and Kasamisequences in broadband signal synchronization systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Maksymov, Volodymyr; Gatturov, Viktor; Khrapovytsky, IgorBackground. Currently, noise-like signals (NLS) are widely used, which provide high noise immunity of broadband communication systems (BSS) when transmitting confidential information in an open radio channel, especially in emergency situations. Increasing the efficiency of the NSS is possible with the use of more advanced code structures, in particular, new methods for constructing Barker code sequences used in wireless communication systems with direct sequence spread spectrum technology. Objective. The aim of the work is to study new composite codes of Barker, Gold and Kasami as synchronization signals of the BSS using simulation. Methods. Analytical calculation methods are used, as well as simulation modelling in the MatLab software package. Results. Modelling in the MatLab environment of new composite Barker codes, Gold codes and Kasam isequences as synchronization signals of the BSS showed that the composite sequences of Barker 49 and 77 in the range of SNR change from 0dB to 30dB are more resistant to interference compared to Kasami-63 and Gold-63 by (0,35 – 22,10)%. Conclusions. Modelling in the MatLab software package showed a greater noise immunity of the new composite Barker codes compared to the Gold and Kasami sequenceswhen used as synchronization signals of the BSS.Документ Відкритий доступ Analysis of differences in the characteristics of queuing systems with the dynamics of input streams self-similarity(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Uryvsky, Leonid; Kryklyva, AnastasiiaBackground. Modern queuing theory is used in many fields and in telecommunications it plays an important role. Today, the modern way to implement queuing systems is a cloud environment. And the main problem of queuing system is to ensure the quality of service. Objective. The purpose of the paper is to study the indicators of service quality of queuing systems with different initial characteristics, to analyse the service quality characteristics when comparing quantitative characteristics of different parameters of queuing systems to identify features of queuing system with self-similarity. Methods. Analyse the theory of QoS, types of distribution, such as Poisson and Weibull, as well as the properties of self-similar traffic. Compare the values of the main parameters that provide the desired quality of service at different inputs and different Hearst parameters. Results. The importance of taking into account the self-similarity factor f or t he a ccuracy o f t he v alues o f t he parameters in the calculation that ensure the quality of service in the QMS. Conclusions. Research of the influence of self-similar traffic on the quality of service in queuing systems.Документ Відкритий доступ Mems-based wireless vibration transducer for condition monitoring(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Ivanov, Sergi; Oliinyk, PavloBackground. When monitoring vibration of rotating machines, especially heavy ones, problems with cables of transducers often emerge. Those cables are usually long, heavy and prone to damage. Objective. The purpose of the paper is to develop a wireless vibration transducer, which is free of those problems, on the base of MEMS accelerometer. Sensor developed should provide low power consumption, linear frequency response at least in 10…1000 Hz range, calculate vibration RMS and detect machine condition based on it. Methods. Develop wireless sensor design based on 8-bit MCU. Develop method of MEMS frequency response correction, based on spectral analysis. Compare sensor developed with industrial piezoelectric ones. Results. Transducer developed can be used instead of the industrial piezoelectric vibration transducers. Moreover, MEMSbased transducer allows one to move basic machine condition detection process from the high–level system to transducer level. That, in turn, allows one to reduce network traffic and simplify condition monitoring system as a whole. Conclusions. MEMS-based wireless vibration transducer for condition monitoring is developed. Tests conducted showed that the transducer developed is well–behaved and its precision is comparable to one of industrial piezoelectric transducers.Документ Відкритий доступ Development of the concept for the computational resources management software in the customer service systems(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Skulysh, Mariia; Pastrana Brincones, José Luis; Parhomenko, DmytroBackground. To date, there is no customer service system that does not involve information and computer systems. One of the most important issues in ensuring the reliability and reliability of such systems is the task of dynamic scaling and providing the required amount of computing resources at any time. This study was focused on the planning and deployment of computing infrastructure that is able to respond to significantly increased volumes of request flows, changes in the dynamics of load intensity, strict requirements for the quality of their service, etc. Objective. The purpose of the paper is to create a concept of virtual computing space to meet the needs of distributed customer service system, which takes into account the peculiarities of service, the computing node load nature, service quality requirements, and provides energy efficient. Developed models, methods will control the performance of distributed computing infrastructure and flow maintenance processes, reduce downtime of computing resources and provide services to end users at a given level of quality. Methods. Analysis of the operation of the node load assessment mechanism, which consists in a dynamic change in the intensity of control of the state of function nodes, showed the effectiveness of planning for a group of computing nodes.. Results. The proposed approach to managing a heterogeneous computation environment to improve the efficiency of the service maintenance process in new generation systems is a unified solution for highly loaded distributed systems. The developed concept made it possible to avoid a decrease in the quality of service during surges of congestion and to maintain the indicators of the quality of service at a given level, provided that the resource utilization ratio is kept within the given limits Conclusions. In summary, a mathematical model of the problem of determining the maximum allowable load volume with a QoS level guarantee for a service node in a heterogeneous telecommunications environment was proposed.Документ Відкритий доступ Accurate detection of multiple targets by uniform rectangular array radar with threshold soft update and area rescanning(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Romanuke, VadimBackground. If the intensity of moving targets within a surveyed area is low, an optimal number of uniform rectangular array (URA) radar sensors is in either the minimally-sized URA (or close to it) or maximally-sized URA (or close to it), where the URA size is regulated by (symmetrically) turning off vertical and horizontal sensors. However, this does not guarantee detection of any target because sometimes the threshold detection, by which the main parameters of a pair of two targets are estimated, fails even by using the soft threshold approach when the threshold is gradually decreased while the detection fails. Objective. In order to improve detection of multiple ground-surface targets by a URA radar, the goal is to decrease a number of detection fails, when targets are just missed. For this, the approach of threshold soft update and a set of quasioptimal URA sizes included 20 25 and 35 35 URAs are to be used by rescanning the area if the detection fails. Methods. To achieve the goal, the functioning of the URA radar is simulated for a set of randomly generated targets, where roughly a half of the set is to be of single targets, and the other half is to be of pairs of targets. The simulation is configured and carried out by using MATLAB® R2021b Phased Array System ToolboxTM functions based on a model of the monostatic radar. Results. Neither the soft threshold approach, nor the rescanning increase the detection accuracy. However, when either the soft threshold or rescanning is applied, or they both are applied, the number of detections is increased. The increment can be evaluated in about 2.7 %, but the expected high-accurate detection performance slightly drops. This is caused by that the soft thresholding and rescanning attempt at retrieving at least some information about the target instead of the detection fail. Conclusions. Using the threshold soft update approach along with a more frequent rescanning decreases a number of detection fails. Besides, the soft thresholding and rescanning allow slightly decreasing the number of URA sensors sufficient to maintain the same detection accuracy by increasing the averaged number of single-target and two-target detections at least by 2.5 %. The increment in a number of detected targets on average is equivalent to increasing the probability of detection.Документ Відкритий доступ Protection against the effect of different classes of attacks on uav control channels(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Kaidenko, Mykola; Kravchuk, SerhiiBackground. Protecting the data link of an unmanned aerial vehicle (UAV) is a top priority for countering attacks on UAVs. In this case, it should be taken into account that even the use of the most protected from the effects of deliberate interference types of modulation with spectrum spread does not guarantee the protection of such a channel. Objective. The vulnerability of UAVs using cyber-attacks on a wireless channel is quite large, its study remains relevant, and therefore further development of complex effective means of countering such cyber-attacks is necessary, which is the purpose of this work. Moreover, the countermeasures presented in the work are based on the use of architectural solutions for building a UAV communication channel, which is different from traditional ones. Methods. Structural-functional methods for constructing a secure wireless system of UAV communication channels are being investigated. Results. A block diagram of the organization of UAV electronic countermeasures has been developed, which shows the data transmission channel from the UAV ground control station, the organization of the jamming channel, and the structure of the signal at the receiver input with all distortions and interference. Interferences that can act as a signal of intentional interference from an electronic warfare station are presented and analysed. An architectural solution is proposed using two channels in different frequency bands for the UAV control channel. A schematic structure of the organization of such a communication channel is presented. An expression is given for the margin of safety of a communication channel against a specific intentional interference. It is shown that the proposed architectural solution will have a similar effect when exposed to structured interference on the communication channel. In the case of the impact of imitation interference, the situation will be ambiguous, so it is very important to correctly determine the channel that is affected by intentional interference. It is shown that to determine the presence of intentional interference, it is necessary to have at least one more degree of freedom, which is necessary for classifying such interference and effectively counteracting it. Such a degree of freedom can be achieved by additional dimensions or architectural solutions for building a communication system. Conclusions. The types of intentional interference that can affect the UAV communication channel, the features of their application, and characteristics to ensure effective electronic protection are presented. Scenarios for counteracting the influence of attacks on UAV control channels are proposed. Scenarios with qualitative estimates are given, on the basis of which algorithms for detecting intentional interference and algorithms for counteracting the influence of such interference on the UAV communication channel can be built. It is assumed that the algorithms use averaged parameters, the length of the averaging interval is chosen as a multiple of the length of one data frame, which makes it possible to exclude from consideration fast fading in the communication channel that occurs in the case of frequency selective channels.Документ Відкритий доступ Іmplementation of medical mask recognition technology in real time using a video camera(National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, 2022) Prochukhan, Dmytro; Korablev, MykolaBackground. The coronavirus pandemic (COVID-19) has led to a major global health crisis due to the rapid spread of the virus. The World Health Organization has provided guidelines for protection against this disease. One of the effective recommendations is to wear a medical mask in public or crowded places. Involving human resources to monitor how these requirements are met is ineffective. It is necessary to automate the process of determining a properly dressed medical mask in real time using a video camera. The authors have developed an application that effectively copes with this task. Objective. The purpose of thew paper is the application development of a medical mask recognition in real time using a video camera, adapted for the use in modern Ukrainian reality with high accuracy and low system requirements. Methods. Analysis of existing analogues in the world, building a model of convolutional neural network, the architecture of which will detect and classify the image obtained from the camcorder in real time, create application architecture, develop a model in Python programming language, application testing. Results. A convolutional neural network of its own architecture has been created. The use of the Adam algorithm to optimize learning and use binary cross entropy as a cost function is substantiated. The method of face recognition using Haar features has been improved. High rate of convolutional neural network training was obtained: the training set accuracy - 97.46%, the test set accuracy - 97.23%, the cost function value at the training set - 2.37%, the cost function value at the test set - 2.57%. An application consisting of three modules has been developed: a machine learning module, an image processing module, a video camera activation module and a mask recognition device. Conclusions. The application effectively copes with the task of recognizing the presence of a medical mask in real time. The developed model in comparison with the analogues has a smaller size and simpler architecture without compromising accuracy or speed. The software has been successfully tested on various operating systems and hardware configurations. The application can be used in areas where there is a need to automate the process of determining the presence and accuracy of wearing a medical mask in real time.Документ Відкритий доступ Improvement of the gps signal receiving resistance against electromagnetic interference, jamming, and spoofing is based on the use of the antenna array system with digital beamforming and NORAD TLE information(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Narytnik, Teodor; Prysiazhnyi, Volodymyr; Kapshtyk, Segii; Denysenko, Maksym; Narushkevych, OleksandraBackground. Currently, in radio navigation systems of the various purposes, the urgent issue is stability increase of the GPS signal reception under such a jamming and spoofing types of the interference influence. In this article, the authors propose a new solution to the stability increase problem of the GPS signal reception against the jamming and spoofing interference based on the spatial selectivity of the receiver antenna. Spatial selectivity is provided through the integrated application of phased array digital beamforming technology and the use of the TLE NORAD information. Objective. The research goal is to develop a methodology for the integrated identification of interference sources to the radio navigation system and to increase the noise immunity for receiving radio navigation signals via spatial selection through the digital beamforming technologies utilization. Methods. For the research process, theoretical methods for the digital beamforming of receiving phased antenna system were used as well as the description of a two-line NORAD information element content, and calculation algorithms for the spacecraft current position. Results. As a result of the research, the GPS signal reception model was formed using spatial selection of GPS signal sources and interference sources, the technique to increase the stability of GPS signal reception under the jamming and spoofing types of interference influence was developed, the block diagram was suggested for the receiving device that implements the developed technique through the integrated application of the digital beamforming technology of the phased array antenna and the TLE NORAD information utilization. Conclusion. A conceptual idea of the method and a technical solution for the proposed method implementation were submitted. The method implementation will improve the stability of GPS signal reception under the influence of jamming and spoofing types of interference.Документ Відкритий доступ Soft frequency reuse for miligation of intercelluler intereference(National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute", 2022) Papushoi, Olha; Mogylevych, DmytroBackground. The appearance of femtocells in LTE networks has provided indoor coverage and overcome large data flows for operators. However, strong interference occurs in neighbouring femtocell users due to the limited available spectrum in cellular networks that transmit data in the same radio range. In densely deployed environments, interference issues in single channel femtocells cause significant performance degradation. In this study, we mitigate inter-cell interference in femtocell networks by combining femtocells as a result of common interference and soft frequency reuse in downlink and uplink by moving and exchanging interfering physical blocks. Objective. The purpose of the paper is to improve the efficiency of ensuring the quality of services in wireless networks by reducing any interference due to the distribution of traffic, which is able to provide uninterrupted connection to the user. Methods. Enabling conditions for inter-cell interference mitigation in LTE-based femtocell networks with soft frequency reuse. Results. Interference is a key issue in the deployment of LTE femtocells. Closely located femtocells interfere with each other if they transmit on the same frequency. Therefore, crossing femtocells and enabling them to allocate resources and reuse soft frequencies effectively reduces interference and prevents the loss of network resources. The scheme is triggered whenever the user's femto equipment experiences strong interference from neighbouring femtocells. By assigning a separate set of physical resource blocks to users at the edge of the cell, our scheme significantly reduces interference, which automatically increases cell throughput. The simulation results show the advantages of applying our scheme, in particular, the interference of the user's femto-equipment is reduced by 14% and the throughput is improved by 25%. That is, we observe a significant improvement in the performance of femtocells. Conclusions. A femtocell crossing scheme with soft frequency reuse is presented to reduce interference between femtocells of LTE networks, which allows effectively ensuring the quality of service transmission in wireless networks by reducing interference and increasing performance through traffic distribution.