2021 International Conference on Computer, Information and Telecommunication Systems (CITS)最新文献

筛选
英文 中文
Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles 基于区块链和多元线性回归的电动汽车能源交易方案
Riya Kakkar, Rajesh Gupta, M. Obaidat, S. Tanwar
{"title":"Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles","authors":"Riya Kakkar, Rajesh Gupta, M. Obaidat, S. Tanwar","doi":"10.1109/cits52676.2021.9618021","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618021","url":null,"abstract":"This paper proposes a blockchain-based secure energy trading platform for electric vehicles (EVs) in a smart grid platform. EVs can be either prosumer (generates and consumes energy) or consumer. The proposed system mainly focuses on securing the energy demand data of EVs. It employs sixth-generation (6G) as a communication network that ensures ultra-low latency, high reliability, and scalable communication. We employed a multiple linear regression (MLR) model to analyze the energy demand data and predict EV energy consumption. Smart grid optimizes the energy for EVs that maximizes the profit for both prosumer and consumer EVs. The performance analysis of the proposed system with the 6G is evaluated by comparing it with the traditional 5G and 4G networks. Various performance metrics that have been considered for assessing the proposed scheme are latency, scalability, and profit for EVs. The performance results and analysis show that the proposed system is reliable, secure, and cost-efficient for both EVs compared to traditional energy trading systems.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115709058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks 认知无线网络频谱接入策略的性能分析
B. Kumar, S. K. Dhurandher, M. Obaidat
{"title":"Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks","authors":"B. Kumar, S. K. Dhurandher, M. Obaidat","doi":"10.1109/cits52676.2021.9618460","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618460","url":null,"abstract":"The world has seen revolutionary changes in the area of communication. Nowadays, communication is the very important part of everyone’s life. It has changes the way we live, talk, move, think, commerce, study and so on. Wireless radio spectrum is the backbone of this entire scintillating structure. Static allocation of radio spectrum has resulted not only in the scarcity of the availability of spectrum bands, but also the under utilization of the available bandwidth as well. Cognitive radio is envisioned as the panacea for this scarcity. The protection of primary users is vital when secondary users use the licensed spectrum bands. Overlay and underlay are the two main approaches being used in the area of cognitive radio networks. Modern research has proven that none of them alone is good enough for achieving the purpose of desirable spectral efficiency. A hybrid approach is required for taking the full benefit of the opportunities generated, due to the behavioural pattern of the primary users. In this article, we use a Markov based model for maximum utilization of available spectrum bands. This article provides a performance analysis of three different access strategies namely Overlay, Underlay, and Hybrid access methods on several network parameters including the primary user (PU) arrival rate, achieved throughput for secondary users, sensing time (sensing interval), and the consumption of energy by the secondary users during the process of data transmission. OMNeT++ simulator is used for the analysis purpose. Our analysis reveals that adopting a hybrid access strategy is more preferable for better spectrum utilization.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handover with Network Slicing in 5G Networks 5G网络中基于网络切片的切换
Kübra Sevim, T. Tuğcu
{"title":"Handover with Network Slicing in 5G Networks","authors":"Kübra Sevim, T. Tuğcu","doi":"10.1109/cits52676.2021.9618576","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618576","url":null,"abstract":"The wide variety of new opportunities offered by 5G, together with the very large number of mobile devices, imposes significant challenges in network operation. Network slicing provides efficient operation of the network under these conditions by separating the slices. However, scalable and flexible approaches are required to allow for the dynamic load of the network. Network slicing is the concept of having multiple isolated virtual networks on top of the same physical infrastructure. As the result of fluctuations (due to mobility or varying offered traffic), a UE may be subject to handover between cells. The selection of the UE and the corresponding service base station (BS) may hamper utilization if the UE undergoing handover cannot be offered the same slice capacities by the destination BS. In this paper, we propose handover to increase the utilization of the radio resources by selecting the UEs that undergo handover according to the required services for each slice and the availability of those slices at the destination BS. We develop an optimization problem to optimize the radio resources and propose three heuristics to reach similar results in considerably low computing times. We simulate the results of the algorithms and show that our heuristics can present solutions close to the optimal within a short time frame.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116725920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Frequency Planning for LoRaWAN networks with urgent traffic 具有紧急流量的LoRaWAN网络的有效频率规划
Athanasios Tsakmakis, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou
{"title":"Efficient Frequency Planning for LoRaWAN networks with urgent traffic","authors":"Athanasios Tsakmakis, A. Valkanis, G. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios I. Papadimitriou","doi":"10.1109/cits52676.2021.9618355","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618355","url":null,"abstract":"LoRaWAN is one of the most promising standards for IoT applications. Slotted ALOHA has been proposed as a LoRaWAN MAC protocol, to achieve performance improvement. This paper explores the effect of using clusters in a multichannel Slotted ALOHA-based LoRaWAN network, for event detection, like forest fires, where a small part of the network nodes, at the pace of the event, produce data at a high rate. It proposes a new frequency planning for such environments, that aims to reduce the number of collisions, and consequently to reduce the mean packet delay, as the data is important to be transmitted as fast as possible. Extensive simulation results indicate a promising performance improvement in terms of throughput and mean packet delay, compared to a random frequency channel assignment to the network nodes.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125743942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2021 CITS Obituary
{"title":"2021 CITS Obituary","authors":"","doi":"10.1109/cits52676.2021.9618349","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618349","url":null,"abstract":"","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128818651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated essay scoring: A review of the field 自动作文评分:对该领域的回顾
P. Lagakis, S. Demetriadis
{"title":"Automated essay scoring: A review of the field","authors":"P. Lagakis, S. Demetriadis","doi":"10.1109/cits52676.2021.9618476","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618476","url":null,"abstract":"This paper critically reviews the recently published scientific literature on the task of Automated Essay Scoring (AES), by examining the various systems and approaches used. Automated Essay Scoring, which is the process of automating the evaluation of answers to open-ended questions, most usually in educational settings, by utilizing NLP techniques, gathers an increasing amount of interest, due to its potential applications both commercially and as part of the learn-ing process. The focus of this paper is to analyze the most popular approaches in recently published AES systems, categorize the systems with respect to certain characteristics in their design, the datasets that they use and the evaluation schemas that are used to evaluate them, and finally discuss the recent trends and challenges of the field of AES.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124232164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Efficient and Secure Design of ID-3PAKA Protocol Using ECC 基于ECC的ID-3PAKA协议高效安全设计
D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam
{"title":"Efficient and Secure Design of ID-3PAKA Protocol Using ECC","authors":"D. Gupta, Krittibas Parai, M. Obaidat, S. H. Islam","doi":"10.1109/cits52676.2021.9618445","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618445","url":null,"abstract":"In this modern era, the need for key agreement protocols equipped with high-speed Internet has become necessary in information/network security. An authenticated key agreement (AKA) protocol is a technique that negotiates a secret session key among various users in a network and is used in many scenarios like mutual authentication, data integrity, and many more. The current state-of-the-art include many AKA protocols that are either vulnerable to different attacks or incur massive communication and computational costs. This paper proposes an identity-based three-party authenticated key agreement (ID-3PAKA) protocol using elliptic curve cryptography (ECC). The proposed ID-3PAKA protocol generates a shared secret session key among three users. The security of the proposed ID-3PAKA protocol relies on the hardness assumption of the ECDLP and the CDH problems. The proposed ID-3PAKA protocol is safe against active and passive attacks, which is proved through the simulation of the OFMC and Cl-AtS back-ends of the AVISPA tool.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124347737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Low-Complexity Soft-Output Signal Data Detection Algorithm for UL Massive MIMO Systems UL大规模MIMO系统的低复杂度软输出信号数据检测算法
Salah Berra, M. Albreem, Maha Malek, R. Dinis, Xingwang Li, Khaled Maaiuf Rabie
{"title":"A Low-Complexity Soft-Output Signal Data Detection Algorithm for UL Massive MIMO Systems","authors":"Salah Berra, M. Albreem, Maha Malek, R. Dinis, Xingwang Li, Khaled Maaiuf Rabie","doi":"10.1109/cits52676.2021.9618605","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618605","url":null,"abstract":"In massive multiple-input multiple-output (MIMO) systems, although the performance of maximum likelihood (ML) is the optimum, it introduces extremely high computational complexity, while minimum mean square error (MMSE) receivers can achieve quasi-optimal performance. Unfortunately, it requires a matrix inverse which increases the computational complexity in high loaded environments. Several methods have been proposed to avoid the matrix inversion such as the accelerated over relaxation (AOR). In the AOR algorithm, the initial solution and the optimum parameters have a great impact on the performance, computational complexity, and the convergence rate. In this paper, a detector based on AOR and a stair matrix is proposed to iteratively avoid the inverse of equalization matrix and expediting the convergence rate. In order to obtain high performance and low complexity, suitable schemes for the selection relaxation and acceleration parameters are also proposed. Numerical results show that the computational complexity of the proposed AOR approach is dramatically reduced from $mathcal{O}left( {{K^3}} right)$ to $mathcal{O}left( {{K^2}} right)$ where K is the number of users. It is also shown that the proposed detection algorithm outperforms the Neumann series method and achieves a quasi-optimal performance with a relatively small number of iterations.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Software-defined Delay-aware Traffic Load Control for WiFi-based Smart City Services 基于wifi的智慧城市服务的软件定义延迟感知交通负载控制
Basima Kurungadan, A. Abdrabou
{"title":"A Software-defined Delay-aware Traffic Load Control for WiFi-based Smart City Services","authors":"Basima Kurungadan, A. Abdrabou","doi":"10.1109/cits52676.2021.9617928","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9617928","url":null,"abstract":"Most Smart city initiatives embrace WiFi as the candidate technology for its ubiquitous coverage and cost-effectiveness. Nevertheless, the quality-of-service (QoS) requirements of different applications vary, hindering the applicability of some smart city services. This paper addresses the usage of software-defined networking ( SDN) to control the traffic load of WiFi access points constituting a city-wide coverage. The traffic load control aims to satisfy the packet delay requirements of smart city applications without the need of having special requirements on the WiFi nodes such as running a software agent, sending probe packets, or supporting specific roaming protocol. A traffic load control algorithm is developed and tested using hardware experiments performed in a practical setting that mimics the actual scenario. The performance results show that the developed algorithm is effective in maintaining low packet transfer delay.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115642792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparisons Between an Oblique Ionosphere Sounding Technique Based on KiwiSDR Receivers and a Proprietary Analytical Propagation Model 基于KiwiSDR接收机的倾斜电离层探测技术与专有分析传播模型的比较
Mircea Stanic
{"title":"Comparisons Between an Oblique Ionosphere Sounding Technique Based on KiwiSDR Receivers and a Proprietary Analytical Propagation Model","authors":"Mircea Stanic","doi":"10.1109/cits52676.2021.9618011","DOIUrl":"https://doi.org/10.1109/cits52676.2021.9618011","url":null,"abstract":"Ionosphere’s variability largely influences the reliability and the stability of high frequency communications. Approaching this topic, the present paper proposes a passive sounding technique able to evaluate narrowband radio channels based on spectral digital signal processing methods. To this end, the study employs two freely available KiwiSDR receivers, thus encouraging a discussion on the potential that the online SDR infrastructure has in relation to ionosphere enquires. The experimental results, derived out of roughly 48 hours of sounding, are ultimately used to determine the degree of conformity of a proprietary analytical model developed previously.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124951148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信