2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

筛选
英文 中文
Performance of Combinational Cooperative Detection Method Under Realistic Conditions 组合协同检测方法在现实条件下的性能
Rameez Ahmed Samo, M. Başaran, Serhat Erküçük
{"title":"Performance of Combinational Cooperative Detection Method Under Realistic Conditions","authors":"Rameez Ahmed Samo, M. Başaran, Serhat Erküçük","doi":"10.1109/ICUMT51630.2020.9222447","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222447","url":null,"abstract":"Combinational cooperative detection (CCD) is a method where signal energies from multiple secondary users (SUs) are gathered in different combinations in order to reach a unique decision for each secondary user regarding the activity of the primary user. In earlier implementations of the CCD method, the locations of the SUs have been assumed to be fixed and selected near the border points of the communication area, and the detection performance has been studied for different parameters. In this paper, the performance of the CCD method has been studied under realistic conditions. Initially, the effect of random locations of SUs on the detection performance is considered and compared with the performance for fixed locations. Then, the effect of distance variations between the master and the user is investigated. Finally, the effect of different propagation environments on the detection performance is studied. The results presented are important to assess the performance of the CCD method under realistic conditions.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-assisted Unmanned Aerial System for Monitoring Sensor Data sdn辅助无人机监测传感器数据系统
V. Vishnevsky, V. Pham, R. Kirichek, V. Elagin, A. Vladyko, A. Shestakov
{"title":"SDN-assisted Unmanned Aerial System for Monitoring Sensor Data","authors":"V. Vishnevsky, V. Pham, R. Kirichek, V. Elagin, A. Vladyko, A. Shestakov","doi":"10.1109/ICUMT51630.2020.9222450","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222450","url":null,"abstract":"Nowadays, using Unmanned Aerial Vehicles (UAV) is applied to many applications such as rescue, streaming, monitoring. The UAVs’ ability can provide flexibility and efficiency in the monitoring operation. However, this poses different challenges, including topology management, resource allocation, and energy consumption for both UAVs and sensor nodes. To address these challenges, this paper discusses applying the approach of Software Defined Networking (SDN) to Unmanned Aerial System for monitoring sensor data, which provide abilities to manage UAV and sensor networks through a centralized SDN controller. The paper presents an architecture framework of SD-UAV and sensor networking. The comparison is performed between the networks with and without using the SDN approach. The results show the efficiency of using SDN to increases the bandwidth and decrease packet loss.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio 基于软件定义无线电的IEEE 802.11物理层业务分析
Jirí Pokorný, R. Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek
{"title":"Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio","authors":"Jirí Pokorný, R. Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek","doi":"10.1109/ICUMT51630.2020.9222444","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222444","url":null,"abstract":"The security of wireless networks is a fairly discussed topic. There are many threads capable of attacking any personal, public, or company network. One way of protection is to analyze traffic on the desired wireless network and look for irregularities in the traffic. There are various approaches on how to capture and analyze wireless traffic. In this paper, we present three enablers on capturing wireless traffic, including Off-the-shelf wireless cards and software defined radios. The results provide the capabilities of used devices and possibilities on how to analyze the traffic. We also present our developed wireless traffic visualizer written in python that can be utilized to discover possible attacks on wireless networks visually.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Recurrent Architecture based Scene Description Generator for Visually Impaired 基于深度循环架构的视障场景描述生成器
Aviral Chharia, Rahul Upadhyay
{"title":"Deep Recurrent Architecture based Scene Description Generator for Visually Impaired","authors":"Aviral Chharia, Rahul Upadhyay","doi":"10.1109/ICUMT51630.2020.9222441","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222441","url":null,"abstract":"Vision is the most essential sense for human beings. But today, more than 2.2 billion people worldwide suffer from some form of vision impairment. This paper presents an end-to-end human-centric model for aiding the visually impaired by employing the deep recurrent architecture of the start-of-the-art image captioning models. A VGG-16 net convolutional neural network (CNN) is used to extract feature vectors from real-time video (image frames) and an long short-term memory (LSTM) network is employed to generate captions from these feature vectors. The model is tested on the Flickr 8K Dataset, one of the most popularly used image captioning dataset which contains over 8000 images. On real-time videos, the model generates rich descriptive captions which are converted to audio for a visually impaired person to listen. Comprehensively the model generates promising results which has great potential to enhance the lives of the visually impaired people by assisting them to get a better understanding of their surroundings.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Computational Geometry Data Structures in Logistics and Navigation Tasks 计算几何数据结构在物流和导航任务
M. Seda, Pavel Seda
{"title":"Computational Geometry Data Structures in Logistics and Navigation Tasks","authors":"M. Seda, Pavel Seda","doi":"10.1109/ICUMT51630.2020.9222453","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222453","url":null,"abstract":"Computational geometry data structures have many applications, such as network optimisation, location tasks, but they can also be used in robot motion planning when a path of the shortest length must be found between the start and target positions that guarantee movements without the risk of collisions with obstacles. The paper deals with visibility graphs, strip and cell decompositions, Voronoi diagrams and compares their properties and efficiency in the investigated area. Since cell decomposition-based approaches give exponential complexity depending on the number of cells, and the knowledge base makes it possible to reduce it mostly only insignificantly, Voronoi diagrams with their polynomial complexity are more efficient for large instances. In addition, their generalized version allows them to generate smooth trajectories.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark 基于数字水印的实现在Unix操作系统中构建可信环境的方法
A. Krasov, S. Shterenberg
{"title":"Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark","authors":"A. Krasov, S. Shterenberg","doi":"10.1109/ICUMT51630.2020.9222413","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222413","url":null,"abstract":"As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of \"foreign\" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"4623 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm "Kuznechik" 基于“Kuznechik”密码算法的伪随机序列生成函数的开发
V. Grozov, A. Guirik, M. Budko, M. Budko
{"title":"Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm \"Kuznechik\"","authors":"V. Grozov, A. Guirik, M. Budko, M. Budko","doi":"10.1109/ICUMT51630.2020.9222457","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222457","url":null,"abstract":"The paper deals with the main component of a deterministic random sequence generator – a generation function based on the algorithm \"Kuznechik\" (Russian encryption standard GOST R 34.12-2015). A procedure of round keys generation that uses the features of the algorithm has been developed. It allows to use the algorithm in a mode that combines the advantages of well-known OFB and CTR encryption modes. In addition, some enhancements of the algorithm that improve the generator security while maintaining its performance are implemented. The quality of the generator was evaluated by means of statistical tests (NIST SP 800-22), Pear-son's criterion, and min-entropy (NIST 800-90B tests). According to the analyzed characteristics, the enhanced generator and its ordinary version based on \"Kuznechik\" algorithm are comparable, but the proposed generation function has a higher security level.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer Simulation and Analysis of A Doubly Fed Induction Generator with A One Side Directly Connected to The Grid 单侧直连双馈感应发电机的计算机仿真与分析
Nguyen Huu Nam, Tran Xuan Trung
{"title":"Computer Simulation and Analysis of A Doubly Fed Induction Generator with A One Side Directly Connected to The Grid","authors":"Nguyen Huu Nam, Tran Xuan Trung","doi":"10.1109/ICUMT51630.2020.9222434","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222434","url":null,"abstract":"Doubly fed induction generator (DFIG) is one of the most complex electrical structures for a power generating system (such as wind turbine and small hydro power). This paper proposes theory calculations, computer simulation and analysis structure of a DFIG with only one side connected to the grid. The stator of wound rotor induction generator (WRIG) is connected directly to the grid, and the rotor is controlled by a converter connected to an ideal battery. The theory calculation results provide the fundamental information for the initial stages of engineering design both in term of separate components (electrical machine, electronic converter) as well as the whole entire generating system. These properties and calculations determine the composition, technical implementation of the components in the system and the interaction between them. The theory and computer simulation results of a 160 kW WRIG system is also presented to prove the feasibility of the proposed system and method.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARDefense: DDoS detection and prevention using NFV and SDN ARDefense:基于NFV和SDN的DDoS检测和防御
A. Singh, R. Jaiswal, A. Khakimov, A. Muthanna
{"title":"ARDefense: DDoS detection and prevention using NFV and SDN","authors":"A. Singh, R. Jaiswal, A. Khakimov, A. Muthanna","doi":"10.1109/ICUMT51630.2020.9222443","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222443","url":null,"abstract":"Network Function Virtualization or NFV gives numerous advantages over the conventional networking techniques by incorporating distinctive features of a network over the virtual machine (VM). It decreases capital and operational costs to give more noteworthy adaptability and flexibility. But all of these advantages come at the expense of the intrinsic system vulnerabilities because of specific sorts of cyber attacks like the Distributed Denial of Service (DDoS) attack. With the increased number of layers in NFV, it becomes easier for an attacker to execute DDoS attack. This study indicates a new model for mitigating the effects of DDoS attacks on NFV. The model has been designed specifically for the individual users especially gamers and online streamers who become victim of DDoS attack on adaily basis. However, the method can be used for a online service like a website in general as well after making certain changes which have been discussed in detail. ARDefense usually performs server migration and IP spoofing when it detects a DDoS attack on the application layer. Effectiveness of ARDefense was tested by measuring load migration and IP spoofing processing time.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantum mechanics with non-negative distribution and measurements 非负分布和测量的量子力学
A. V. Zorin, N. Tretyakov
{"title":"Quantum mechanics with non-negative distribution and measurements","authors":"A. V. Zorin, N. Tretyakov","doi":"10.1109/ICUMT51630.2020.9222429","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222429","url":null,"abstract":"The issues of interaction between the measuring device and the micro system have not yet been completely resolved. Moreover, if at the dawn of quantum mechanics attention was paid to the influence of the device on the state of the system, then later (D.V. Blokhintsev) interest in the inverse problem (and, in essence, more traditional) - on the influence of the micro-object on the state of the macro-system increased. Measuring instruments consist of a number of interconnected links. The quantum theory of measurements asserts that the first cascades can be quantum, but the last should be classical (in the current terminology - an analyzer and a detector). This paper discusses the integration of such an approach to measuring instruments in the formalism of quantum mechanics. Test (auxiliary) functions in quantum mechanics with nonnegative distribution functions (quantum mechanics Kuryshkin-Wodkevich - QDF), in fact, can and should be associated with the measurement process and measuring instruments. Our thesis is that these functions should be related to the measuring instrument used and describe its interaction with the system. It turns out that exactly the non-Hermitian character of the Hamiltonians in QDF expresses this connection. Thus, the QDF, which has long been positioned as an alternative and exotic quantum theory, is increasingly taking shape as a quantum theory of measurements. Only a short time ago, in our works the meaning of this formalism as the theory of quantum measurements was clarified. The analogies of auxiliary functions in the QDF theory with wave functions in the examples of D. Blokhintsev measuring instruments mentioned in this paper, are promising areas of research which, in the framework of the study of quantum entanglement, can give a significant impetus to the development of quantum cryptography. This work, in this sense, should become a turning point in this reversal of the QDF to new applications.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130918670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信