2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)最新文献

筛选
英文 中文
A cognitive system for future-proof wireless microphones: Concept, implementation and results 面向未来的无线麦克风认知系统:概念、实现和结果
J. Brendel, S. Riess, R. Weigel, G. Fischer
{"title":"A cognitive system for future-proof wireless microphones: Concept, implementation and results","authors":"J. Brendel, S. Riess, R. Weigel, G. Fischer","doi":"10.1109/TELSKS.2013.6704934","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704934","url":null,"abstract":"Since several years, `cognitive radio' is given much attention in research and is seen as a future technology in communications. In this paper a cognitive radio system for Program Making and Special Event (PMSE) devices (e.g. wireless microphones) is presented and the results of a field test are discussed. First, we outline the challenges which the PMSE industry has to cope with and how changes in regulatory and the digital dividend in the TV UHF band has impact on the operation reliability of PMSE devices. Afterwards, a system is presented that uses cognitive radio techniques to ensure the high audio quality requirements and interference free operation of PMSE devices under the previously mentioned circumstances. Beside a general overview over the developed system we focus on a distributed spectrum sensing network as part of the cognitive information acquisition to monitor the current spectrum situation. The data is used by the cognitive engine to detect potential interferers and to trigger operation parameter changes (e.g. frequency or transmit power) of the PMSE devices to avoid link quality degradation. We present the built-up sensor nodes for the spectrum measurement and the developed software to control the sensor nodes and to preprocess the measured data. Finally, the results, collected with the field test platform in the fair-ground of Berlin, show convincingly how the developed cognitive system makes PMSE devices future-proof.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127775336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis of SCADA system vulnerabilities to DDoS attacks SCADA系统面对DDoS攻击的漏洞分析
Jasna D. Marković-Petrović, M. Stojanović
{"title":"Analysis of SCADA system vulnerabilities to DDoS attacks","authors":"Jasna D. Marković-Petrović, M. Stojanović","doi":"10.1109/TELSKS.2013.6704448","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704448","url":null,"abstract":"Several factors have contributed to the escalation of risks specific to novel control systems, including the network architecture, adoption of standardized technologies with known vulnerabilities and connectivity of control systems to other networks. This paper considers SCADA (Supervisory Control And Data Acquisition) system vulnerabilities as well as securing the infrastructure of power utility information-telecommunication systems. We first present a concept of SCADA architecture in the hydropower plants. The simulation model assumes Distributed Denial of Service (DDoS) attack to SCADA system. A comprehensive simulation points to SCADA performance deterioration under DDoS attack. Possible security solutions have also been discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132689858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Comparison of compression performance of 10-bit vs. 8-bit depth, under H.264 Hi422 profile H.264 Hi422配置文件下10位与8位深度压缩性能的比较
Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano
{"title":"Comparison of compression performance of 10-bit vs. 8-bit depth, under H.264 Hi422 profile","authors":"Damian Ruiz, S. Sladojevic, D. Culibrk, G. Fernández-Escribano","doi":"10.1109/TELSKS.2013.6704904","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704904","url":null,"abstract":"H.264 is one of the first video coding standard incorporating coding formats with a bit-depth of above 8 bits. This paper presents the results of compression comparison tests for the H.264 “High 422” profile, between 10-bit and 8-bit sample depths. The simulations were run on five 720p and 1080i high definition sequences. PSNR and SSIM metrics were used to evaluate the objective quality performance of both bit-depths, and with the aim of enabling a fair comparison, both metrics were computed with 10-bit precision, up-scaling the 8-bit decoded sequences to 10-bits. Some works have been published in this field based on the evaluation of commercial 10-bit H.264 implementations. In this work, we carry out a neutral evaluation of H.264 standard performance using the official H.264 Reference Software. Unlike the expected 10-bit coding gains, the results show unnoticeable differences between both sample depths in terms of objective quality, lower 0.1dB for PSNR and 0.002 for SSIM, with a 5% bit rate saving that can be achieved for the luminance component, especially for the 720p format, and negligible quality improvement for U and V chroma components.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132005745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spectral correlation characterization of MB-OFDM signals MB-OFDM信号的频谱相关特性
D. Vucic, M. Eric, I. Pokrajac
{"title":"Spectral correlation characterization of MB-OFDM signals","authors":"D. Vucic, M. Eric, I. Pokrajac","doi":"10.1109/TELSKS.2013.6704424","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704424","url":null,"abstract":"A new, matrix-based, stochastic method for cyclic spectral analysis of MB-OFDM signals, based on their Markov chain representation, is proposed. Explicit expression for the cyclic spectrum of these signals is derived. Some theoretical and simulation results for the spectral correlation characterization of MB-OFDM signals are presented, as well.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving protection of PHP source code using cryptology models 使用密码学模型改进PHP源代码的保护
A. Jevremović, Nenad Ristić, M. Veinovic
{"title":"Improving protection of PHP source code using cryptology models","authors":"A. Jevremović, Nenad Ristić, M. Veinovic","doi":"10.1109/TELSKS.2013.6704410","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704410","url":null,"abstract":"Nowadays there is growing issue in protecting PHP scripts from unwanted using, copying and modifications. Existing solutions on source code level are mostly working as obfuscators, are free, and are not providing any serious protection. Solutions that encode opcode are more secure but are commercial and require closed-source proprietary PHP interpreter's extension. Additionally, encoded opcode is not compatible with future versions of interpreters which imply rebuying encoders from authors. Finally, if extension source-code is compromised, all script encoded by that solution are compromised too. In this paper we present a novel model for free and open-source PHP script protection solution. Protection level provided by proposed solution is equal to protection level of commercial solutions. Model is based on conclusions from using standard cryptology models for analyzing strengths and weaknesses of existing solutions when scripts protection is seen as secure communication channel in cryptology.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116337451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Case study: DNS service protection methods 案例分析:DNS服务保护方法
Ljubomir Ivanis, S. Adamovic, A. Jevremović
{"title":"Case study: DNS service protection methods","authors":"Ljubomir Ivanis, S. Adamovic, A. Jevremović","doi":"10.1109/TELSKS.2013.6704446","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704446","url":null,"abstract":"This paper describes security problems in communication between DNS service and its clients. It describes the use of new technologies that provide increased safety in terms of communication, and their application to a specific case. The paper is based on the experiences gained during the implementation of security solutions in CPU Ltd., specifically the section relating to the protection of DNS service from abuse. This paper will describe some practical solutions that have been implemented.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116744006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aligned software and process models with both the eTOM framework and the ITIL processes 将软件和过程模型与eTOM框架和ITIL过程对齐
Aleksandra Denda, D. Drajic
{"title":"Aligned software and process models with both the eTOM framework and the ITIL processes","authors":"Aleksandra Denda, D. Drajic","doi":"10.1109/TELSKS.2013.6704461","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704461","url":null,"abstract":"The main objective of this consolidation work is to define and implement TO - BE Incident Management process between three different company that operate in three different countries which incorporate both eTOM and ITIL frameworks taking in eTOM process definitions within the context of the wider ITIL processes. It will enable process automation for network and service assurance for multi-vendor, multi-technology resource infrastructures. Implementation of the new common regional Service management system together with the redesign and implementation of new service management processes are expected to enable the effective and efficient delivery of services and support of changing business needs.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA Implementation of Joint Spatio-Temporal Spectrum Sensing Algorithm Based on Direct Localization Method 基于直接定位法的联合时空频谱感知算法的FPGA实现
S. Brkić, M. Eric
{"title":"FPGA Implementation of Joint Spatio-Temporal Spectrum Sensing Algorithm Based on Direct Localization Method","authors":"S. Brkić, M. Eric","doi":"10.1109/TELSKS.2013.6704937","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704937","url":null,"abstract":"In this paper a practical implementation of joint spatio-temporal spectrum sensing method based on direct localization is presented. The chosen algorithm was implemented in FPGA (Field-Programmable Gate Array) technology which can provide necessary computation power for executing complex sensing operation and achieves sensing duration measured in microseconds.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF MEMS based systems for space communications 基于射频MEMS的空间通信系统
L. Vietzorreck, Taeyoung Kim
{"title":"RF MEMS based systems for space communications","authors":"L. Vietzorreck, Taeyoung Kim","doi":"10.1109/TELSKS.2013.6704399","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704399","url":null,"abstract":"In this paper novel concepts for space communication systems are introduced. A switch matrix system for satellite applications based on RF MEMS switches is described. For space applications RF MEMS switches have several advantages compared to their mechanical or solid-state counterparts. They are small, compact and lightweight with a high linearity up to high frequencies. The simulated performance of the 12×12 switch matrix is below -12dB IL (Insertion Loss) up to C band and better than -15dB RL (Return Loss) up to Ku band. Moreover, it has a good isolation better than -50dB. Technology, performance and limitations of the proposed system are discussed.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to assess criticality of elements in the process of information infrastructure protection 信息基础设施保护过程中要素关键度评估方法
Goran Murić, D. Macura, N. Gospic, D. Bogojevic
{"title":"An approach to assess criticality of elements in the process of information infrastructure protection","authors":"Goran Murić, D. Macura, N. Gospic, D. Bogojevic","doi":"10.1109/TELSKS.2013.6704909","DOIUrl":"https://doi.org/10.1109/TELSKS.2013.6704909","url":null,"abstract":"In this paper the new approach to assessment an importance/criticality of elements within the critical information infrastructure is presented. The proposed method is based on the identification of critical routes within the network, and the recognition of the most important nodes without using centrality measures and simulation techniques. The elements and their dependencies within the information infrastructure are transformed into a relational topological graph. The elements are presented as the nodes, and the relations between them as the edges of the graph.","PeriodicalId":144044,"journal":{"name":"2013 11th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124937357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信