{"title":"Managing the OTT Traffic in NFV Environment","authors":"Adrian Popescu, Mohammad Asad Rehman Chaudhry","doi":"10.1109/iccomm.2018.8484270","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484270","url":null,"abstract":"The emerging concepts Software Defined Networking (SDN) and Network Functions Virtualisation (NFV) lay the ground for system softwarization of future networks and services, under the umbrella of 5G. In this regard, a special focus is given to Video Distribution Networks (VDN), particularly in relation to existing difficulties in handling demands laid on the network as well as in relation to challenges in providing the expected Quality of Experience (QoE) and other performance demands like minimum energy consumption. The paper is focused on some of the most important elements associated with the virtualisation of Over-The-Top (OTT) video distribution networks and also advancing the system for managing the OTT traffic in Network Function Virtualisation (NFV) environment. The paper provides motivation, problem description, virtualisation target, standardisation efforts, NFV framework as well as short presentation of the main technical issues associated with managing the OTT traffic inNFV scenarios.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124745536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Năstac, Elena-Simona Lehan, Florentin Alexandru Iftimie, O. Arsene, B. Cramariuc
{"title":"Automatic Data Acquisition with Robots for Indoor Fingerprinting","authors":"D. Năstac, Elena-Simona Lehan, Florentin Alexandru Iftimie, O. Arsene, B. Cramariuc","doi":"10.1109/iccomm.2018.8484796","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484796","url":null,"abstract":"This paper addresses the problem of automatic data collection for the purpose of indoor positioning via Received Signal Strength (RSS) fingerprinting. A robotic platform with basic odometer sensors was used in an university building to automate the process of data acquisition which becomes particularly time consuming when considering mapping of large spaces such as shopping malls or hospitals. More than 3000 observations were collected. We associated for each observation their two dimensional coordinates with the received MAC RSS vector. Preprocessing methods included data augmentation and feature normalization. We searched for multiple models and one of the best performance was achieved by using neural networks and post-filtering.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124795449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polarity and Sentiment Analysis of Medical Transplant Literature","authors":"P. Gogalniceanu, H. Teodorescu","doi":"10.1109/ICCOMM.2018.8430144","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430144","url":null,"abstract":"The comparative analysis of three flagship medical journals from different specialties show that (i) strongly polar words are relatively common in medical research papers, (ii) each specialty has its own main polar words; (iii) transplant medicine favors words reflecting the stress of the discipline, with specifically high frequency for words such as ‘challenging’, ‘demanding’, ‘risk’, ‘human error’, and ‘danger’, and an emphasis on ‘decision-making’.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristinel Gavrila, Csaba-Zoltan Kertesz, M. Alexandru, V. Popescu
{"title":"Reconfigurable IoT Gateway Based on a SDR Platform","authors":"Cristinel Gavrila, Csaba-Zoltan Kertesz, M. Alexandru, V. Popescu","doi":"10.1109/ICCOMM.2018.8430127","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430127","url":null,"abstract":"The current enabler for Internet of Things (IoT) are short-range terrestrial communications embedded on affordable, low-power wireless devices that have as their main drawback the necessity to be connected to a specific gateway that enables them to communicate with the world. The variety of communication standards which are currently used in the IoT world, poses difficulties for having a single device able to act as a gateway for the most important wireless standards. A Software Defined Radio (SDR) platform can be a perfect solution for a single, reconfigurable device. The paper proposes a general architecture for an IoT Gateway and describes the implementation of the architecture as a fully functional prototype for a IoT gateway based on an embedded SDR platform. The developed prototype, implemented as a standalone RF platform, is able to route data to and from M2M/IoT applications, covering the most common short-range wireless protocols and standards (802.11 b/g/n, ZigBee, BLE, LoRa, etc). By implementing the above-mentioned wireless protocols on a SDR platform and using its RF capabilities together with a sniffing procedure, these wireless protocols can be detected by the SDR gateway and subsequently communication can be configured to enable transmission between the end devices and external infrastructure, using IP-based packet communication through the means of an MQTT broker. A control interface manages all the gateway activities, provides statistics and ensures human intervention in the system.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128713680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Properties of the System Mismatch Covariance Matrix in the LMS Adaptive Algorithm","authors":"Laura-Maria Dogariu, S. Ciochină, C. Paleologu","doi":"10.1109/iccomm.2018.8484800","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484800","url":null,"abstract":"Ahstract-The system mismatch covariance matrix is of major interest in some of the optimization approaches of the least-mean-square type adaptive algorithms. Some examples are the ones based on the Kalman filtering theory, or the variable step-size algorithms based on the minimization of the mean square system mismatch. All of them require information about this specific matrix. The usual assumption is to approximate this matrix with a scaled unity one. This paper analyzes the validity conditions of this assumption. Simulation results support the theoretical findings.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130033219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QRASSH - A Self-Adaptive SSH Honeypot Driven by Q-Learning","authors":"Adrian Pauna, A. Iacob, I. Bica","doi":"10.1109/ICCOMM.2018.8484261","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8484261","url":null,"abstract":"Developed for the first time in the 80s, honeypot systems research increased tremendously in the last decade. Moving from simple monitored, emulated, Internet Services, towards intelligent systems that autonomously interact with attackers, was a normal engagement in the context of higher development of artificial intelligence as science. In this paper we present a newly developed SSH self-adaptive honeypot system that uses a Deep Q-Learning algorithm in order to decide how to interact with external attackers. The honeypot system is developed in Python and integrates an existing implementation of a Reinforcement Learning algorithm that makes use of neural network (NN).","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of “Drive Me” - a Human Robot Interaction System","authors":"O. Vultur","doi":"10.1109/iccomm.2018.8484759","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484759","url":null,"abstract":"In this paper we introduce a new human-robot interaction system, called “Drive Me” and we make a performance analysis of the system. The system is composed of the human operator, which “drives” the wireless robot using natural arms gestures and the Surveyor's SRV1 robot. The gestures recognition is made using the DTW algorithm and a Kinect sensor. The system is independent of the lighting conditions, it works both in the day light or by night, does not depend of the users' clothes and does not depend of the distance from the robot to the human operator. The robustness of the system is shown by the good gesture recognition rate obtained, which makes of this system a real-time HRI system. We made a performance analysis of the system and we calculated the following performance parameters: accuracy, error rate, precision, sensitivity, specificity, positive and negative likelihood of gesture recognition.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130845880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vlad Fernoaga, George Alex Stelea, D. Robu, F. Sandu
{"title":"Communication Solutions for Power Measurement in the Cloud","authors":"Vlad Fernoaga, George Alex Stelea, D. Robu, F. Sandu","doi":"10.1109/ICCOMM.2018.8430105","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8430105","url":null,"abstract":"Development in both embedded systems and industrial communications brings a new challenge in re-balancing Edge computing and Cloud computing, particularly in the Smart Grids. This paper presents two sets of solutions for intelligent electricity “Cloud-counters” with local power measurement and with the tele-transmission of acquired voltage and current samples for the central active and reactive power computation in a smart-metering Cloud server with virtual instrumentation capabilities. Both solutions are using low-cost Wi-Fi interfacing, TCP transmission and centralized data logging and analytics based on National Instruments LabVIEW and DIAdem interoperability. For the transmission of data between the processing and the analytics layer a database was used as interface. DIAdem is able to retrieve raw information about measured data form the database and correlates this with attached meta information like timestamp and device MAC address. The limitations in the length of TCP transmission units are dealt with a quasi-PLL computation of the exact number of samples/period and a special time-domain formula of the reactive power involving the Hilbert transform of the voltage.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131648558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Optimization of Modified K-Exponential Filter","authors":"Nicolae Dumitru Alexandru, A. L. Balan","doi":"10.1109/ICCOMM.2018.8484806","DOIUrl":"https://doi.org/10.1109/ICCOMM.2018.8484806","url":null,"abstract":"Thanks to modern technologies, the communication systems are using pulse-shaping filters robust to timing error and in many instances integrated to minimize the effects of noise and inter-symbol interference (lSI). In this article, we have been carried out an investigation in order to decipher the mechanism behind the increased performance of the improved Nyquist filter when sampled with a time offset, as compared with other improved filters. As a result, a family of generalized/modified K exponential filters was proposed, and its performance was investigated in terms of probability of error. In purely technological terms, one key to improve the bit error probability without sacrificing the performance in terms of spectral re-growth is to derive new frequency characteristic shapes. Also this helps to understand what could be done in order to further improve the performance of a Nyquist filter.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115645151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Image Identification for Double-Compressed JPEG Images","authors":"Kenta Iida, H. Kiya","doi":"10.1109/iccomm.2018.8484780","DOIUrl":"https://doi.org/10.1109/iccomm.2018.8484780","url":null,"abstract":"It is known that JPEG images uploaded to social networks (SNs) are mostly re-compressed by the social network providers. Because of such a situation, a new image identification scheme for double-compressed JPEG images is proposed in this paper. The aim is to detect a single-compressed image that have the same original image as that of a double-compressed one. In the proposed scheme, the signs of only DC coefficients in DCT coefficients and one threshold value are used for the identification. The use of them allows us to robustly avoid errors caused by double-compression, which are not considered in conventional schemes. The proposed scheme has applications not only to find uploaded images corresponding to double-compressed ones, but also to detect some image integrity. The simulation results demonstrate that the proposed one outperforms conventional ones including state-of-art image hashing one in terms of the querying performance.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121656535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}