2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

筛选
英文 中文
Data Updating Models for Priority Vehicles 优先车辆的数据更新模型
A. Shestakov, Yaroslav A. Pletnev, K. A. Frolova
{"title":"Data Updating Models for Priority Vehicles","authors":"A. Shestakov, Yaroslav A. Pletnev, K. A. Frolova","doi":"10.1109/ICUMT51630.2020.9222414","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222414","url":null,"abstract":"At present, it is quite relevant to search for ways to reduce the cost of deploying and operating infotelecommunication and road urban infrastructure. The existing technologies of message delivery in sensor networks taking into account the positioning of mobile objects are considered, such as GGF, GFR, GGR, LAR, ALARM, LACBER. The paper substantiates the need to study the mechanisms of reducing excessive traffic in hierarchical networks when updating data in highly automated vehicles from the thematic layers of external geoinformation systems. An approach to using advanced filtering procedures for peer-to-peer cluster sensor networks is described. An algorithm for updating data for groups of priority mobile objects is proposed. The authors describe the possibility of using existing analytical and simulation methods to evaluate the proposed improved traffic routing procedures for updating spatial data for priority vehicle that moves in a column. It is proposed to implement an additional unit for the existing simulation model. It takes into account the specifics of priority traffic moving in the convoy.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guidelines for Using Machine Learning Technology to Ensure Information Security 使用机器学习技术确保信息安全的指南
M. Kovtsur, Anastasia Valerievna Mikhailova, Pavel Andreevich Potemkin, I. Ushakov, A. Krasov
{"title":"Guidelines for Using Machine Learning Technology to Ensure Information Security","authors":"M. Kovtsur, Anastasia Valerievna Mikhailova, Pavel Andreevich Potemkin, I. Ushakov, A. Krasov","doi":"10.1109/ICUMT51630.2020.9222417","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222417","url":null,"abstract":"Artificial intelligence is a technology that allows you to automate and optimize any process in all areas of human life. Machine learning allows you to create irreplaceable and highly effective assistants that can perform various actions, even those that cannot always be performed by humans. The use of this technology in the field of information security today is a promising and actual tasks for solution, development and implementation, since every day more and more serious threats to cyberspace appear, new vulnerabilities of web pages and operating systems and even antivirus programs are found, and often a person does not have time to track all of them. This is why using automated assistants to track potential threats and attacks can reduce the risk of breaches and information leaks for virtually any enterprise and company.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cellular-enabled Wearables in Public Safety Networks: State of the Art and Performance Evaluation 公共安全网络中支持蜂窝的可穿戴设备:最新技术和性能评估
Salwa Saafi, Jiri Hosek, Aneta Kolackova
{"title":"Cellular-enabled Wearables in Public Safety Networks: State of the Art and Performance Evaluation","authors":"Salwa Saafi, Jiri Hosek, Aneta Kolackova","doi":"10.1109/ICUMT51630.2020.9222459","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222459","url":null,"abstract":"With the aim of offering services and products that ensure the safety of people and properties, public safety organizations are responsible for providing the first responders, i.e., police officers, firefighters, and emergency medical service workers, with devices and communication systems that help them exchange time-sensitive and critical information. To address the mission-critical requirements and to target new broadband public safety applications, these organizations started migrating from traditional land mobile radio towards cellular communication systems with the consideration of a new set of deployed devices, such as wearables. In this paper, we first provide a state of the art overview of the features that are introduced by the 3rd Generation Partnership Project (3GPP) and that can be used for public safety services. Second, we discuss the role of wearable devices, more precisely cellular-enabled wearables, in creating several new use cases as part of the concept of the Internet of Life Saving Things. Finally, we conduct a performance evaluation of a mission-critical service using cellular-enabled wearables, specifically a mission-critical push-to-talk (MCPTT) application using LTE Cat-M2-enabled smartwatches. In this evaluation, we examine the impact of different parameters related to the wearable device capabilities and the MCPTT call scenarios on the key performance indicator defined by 3GPP for this type of applications, which is the MCPTT access time.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Technical Perspectives of Contact-Tracing Applications on Wearables for COVID-19 Control 可穿戴设备在新冠肺炎防控中的接触者追踪应用技术展望
Viktoriia Shubina, A. Ometov, E. Lohan
{"title":"Technical Perspectives of Contact-Tracing Applications on Wearables for COVID-19 Control","authors":"Viktoriia Shubina, A. Ometov, E. Lohan","doi":"10.1109/ICUMT51630.2020.9222246","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222246","url":null,"abstract":"The wearables’ market is rapidly evolving, with applications ranging from healthcare and activity monitoring to emerging domains such as drones and haptic helmets. Wearable-based contact tracing is gaining increased attention in the COVID-19 era for more efficient disease prevention. Therefore, it is of timely relevance to identify the leading existing wireless contact-tracing solutions and their suitability for wearables. Existing trade-offs of contact-tracing applications require a thorough analysis of technical capabilities, such as accuracy, energy consumption, availability, sources of errors when dealing with wireless channels, privacy challenges, and deterrents towards a large-scale adoption on the wearables market. Based on extensive literature research, we conclude that decentralized architectures generally offer a better place in a trade-off in terms of accuracy and user eagerness to adopt them, taking into account privacy considerations, compared to centralized approaches. Our paper provides a brief technical overview of the existing solutions deployed for contact tracing, defines main principles that affect the overall efficacy of digital contact tracing, and presents a discussion on the potential effect of wearables in tackling the spread of a highly contagious virus.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On the generation of Pulse OFDM signals 关于脉冲OFDM信号的产生
M. Bakulin, V. Kreyndelin, D. Petrov, S. Melnik
{"title":"On the generation of Pulse OFDM signals","authors":"M. Bakulin, V. Kreyndelin, D. Petrov, S. Melnik","doi":"10.1109/ICUMT51630.2020.9222242","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222242","url":null,"abstract":"High peak-to-average power ratio (PAPR) is one of the disadvantages of OFDM transmitters with linear amplifiers. However, many of the existing PAPR reduction algorithms decrease spectral efficiency but do not bring any significant reduction in power consumption. This problem can be solved by the utilization of transmitters that are generating a signal as a sequence of pulses. In this paper, we describe a method for generating the pulse signal by converting the original OFDM signal into a signal on a rectangular carrier. It is demonstrated that the constructed Pulse OFDM signal can be received with a conventional OFDM receiver.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pitfalls of LPWA Power Consumption: Hands-On Design of Current Probe 低功耗广域网功耗陷阱:电流探头的实际设计
Radek Mozny, Pavel Mašek, Martin Stusek, Michal Mikulasek, A. Ometov, Jiri Hosek
{"title":"Pitfalls of LPWA Power Consumption: Hands-On Design of Current Probe","authors":"Radek Mozny, Pavel Mašek, Martin Stusek, Michal Mikulasek, A. Ometov, Jiri Hosek","doi":"10.1109/ICUMT51630.2020.9222449","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222449","url":null,"abstract":"The unique opportunities introduced by the emerging Industrial Internet of Things (IIoT) applications have accelerated the momentum of the massive Machine-Type Communications (mMTC) worldwide. As the number of already deployed Low-Power Wide-Area (LPWA) applications growth exponentially over the last decade, new open challenges started to be discussed across the industry sector. The most critical parameter of the LWPA devices in question is energy efficiency and the overall power consumption of designed end-devices. Therefore, the need for precise measurement of power consumption has attracted engineers’ attention as the unique communication parameters of the LPWA devices form the current consumption measurements challenging task. To facilitate accurate current measurements ranging between hundreds of nA and hundreds of µA, we propose a unique design of the current probe prototype. We then demonstrate the obtained results concerning the accuracy, measurement range switching, and sufficient sampling speed. All the measurements from the designed prototype are further compared with the industry-grade DC power analyzer Agilent N6705B.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of wireless fake access points 检测无线假接入点
Norbert Lovinger, Tomas Gerlich, Zdenek Martinasek, L. Malina
{"title":"Detection of wireless fake access points","authors":"Norbert Lovinger, Tomas Gerlich, Zdenek Martinasek, L. Malina","doi":"10.1109/ICUMT51630.2020.9222455","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222455","url":null,"abstract":"Wireless networks have become a common part of everyone’s life who wants to connect to the Internet network. Despite the rapid development of wireless technologies, common users still do not pay much attention to the security questions. One of the most challenging security problems of Wi-Fi networks is to detect and prevent the fake access point attack. Existing solutions require the installation of proprietary hardware, protocol changes, measuring frame characteristics etc. Moreover, these solutions are strictly focused on an individual cyber attack detection. In this work, we propose our method that detects a fake access point and that allows the detection of multiple cyber attacks in local wireless networks. In our research, we focus on the detection of the fake access point attack, the KARMA attack, the frequency congestion attack and the de-authentication attack.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVM 将机器学习应用于LTE流量预测:Bagging, Random Forest和SVM的比较
Nikolai Stepanov, D. Alekseeva, A. Ometov, E. Lohan
{"title":"Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVM","authors":"Nikolai Stepanov, D. Alekseeva, A. Ometov, E. Lohan","doi":"10.1109/ICUMT51630.2020.9222418","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222418","url":null,"abstract":"Today, a significant share of smartphone applications use Artificial Intelligence (AI) elements that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied to the Edge paradigm aiming to predict and optimize the network load conventionally caused by human-based traffic, which is growing each year rapidly. The application of both standard and deep ML techniques is expected to improve the networks’ operation in the most complex heterogeneous environment. In this work, we propose a method to predict the LTE network edge traffic by utilizing various ML techniques. The analysis is based on the public cellular traffic dataset, and it presents a comparison of the quality metrics. The Support Vector Machines method allows much faster training than the Bagging and Random Forest that operate well with a mixture of numerical and categorical features.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127367475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信