Journal of Telecommunictions and Information Technology最新文献

筛选
英文 中文
Speech-Based Vehicle Movement Control Solution 基于语音的车辆运动控制解决方案
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.149820
G. Kaur, Mohit Srivastava, Amod Kumar
{"title":"Speech-Based Vehicle Movement Control Solution","authors":"G. Kaur, Mohit Srivastava, Amod Kumar","doi":"10.26636/jtit.2021.149820","DOIUrl":"https://doi.org/10.26636/jtit.2021.149820","url":null,"abstract":"|The article describes a speech-based robotic prototype designed to aid the movement of elderly or handicapped individuals. Mel frequency cepstral coe(cid:14)cients (MFCC) are used for the extraction of speech features and a deep belief network (DBN) is trained for the recognition of commands. The prototype was tested in a real-world environment and achieved an accuracy rate of 87.4%.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Shared Cybersecurity Awareness Platform 共享网络安全意识平台
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.154421
M. Amanowicz
{"title":"A Shared Cybersecurity Awareness Platform","authors":"M. Amanowicz","doi":"10.26636/jtit.2021.154421","DOIUrl":"https://doi.org/10.26636/jtit.2021.154421","url":null,"abstract":"|Ensuring a good level of cybersecurity of global IT systems requires that speci(cid:12)c procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may a(cid:11)ect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake speci(cid:12)c activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-real-time response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning speci(cid:12)c events. It also o(cid:11)ers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operators.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130960056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tractography Methods in Preoperative Neurosurgical Planning 神经外科术前计划中的神经束造影方法
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.154521
Mateusz Koryciński, K. Ciecierski
{"title":"Tractography Methods in Preoperative Neurosurgical Planning","authors":"Mateusz Koryciński, K. Ciecierski","doi":"10.26636/jtit.2021.154521","DOIUrl":"https://doi.org/10.26636/jtit.2021.154521","url":null,"abstract":"","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Power Beacons and Wireless Power Transfers for Non-Orthogonal Multiple Access Networks 为非正交多址网络启用功率信标和无线功率传输
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.152421
Chi‐Bao Le, N. D. Nguyen
{"title":"Enabling Power Beacons and Wireless Power Transfers for Non-Orthogonal Multiple Access Networks","authors":"Chi‐Bao Le, N. D. Nguyen","doi":"10.26636/jtit.2021.152421","DOIUrl":"https://doi.org/10.26636/jtit.2021.152421","url":null,"abstract":"|This paper studies downlink cellular networks relying on non-orthogonal multiple access (NOMA). Speci(cid:12)cally, the access point (AP) is able to harvest wireless power from the power beacon (PB). In the context of an AP facilitated with multiple antennas, the transmit antenna selection procedure is performed to process the downlink signal, with the transmission guaranteed by energy harvesting. Therefore, a wireless power transfer-based network is introduced to overcome power outages at the AP. In particular, an energy-constrained AP harvests energy from the radio frequency signals transmitted by the PB in order to assist in transmitting user data. Outage performance and ergodic capacity are evaluated with the use of closed-form expressions. In order to highlight some insights, approximate computations are provided. Finally, numerical simulations are performed to con(cid:12)rm the bene(cid:12)ts of combining the downlink NOMA transmission and the transmit power scheme at the AP in order to serve a multitude of users.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131070062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear and Planar Array Pattern Nulling via Compressed Sensing 基于压缩感知的线性和平面阵列方向图归零
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.152921
J. Mohammed, R. H. Thaher, A. Abdulqader
{"title":"Linear and Planar Array Pattern Nulling via Compressed Sensing","authors":"J. Mohammed, R. H. Thaher, A. Abdulqader","doi":"10.26636/jtit.2021.152921","DOIUrl":"https://doi.org/10.26636/jtit.2021.152921","url":null,"abstract":"An optimization method based on compressed sensing is proposed for uniformly excited linear or planar antenna arrays to perturb excitation of the minimum number of array elements in such a way that the required number of nulls is obtained. First, the spares theory is relied upon to formulate the problem and then the convex optimization approach is adopted to find the optimum solution. The optimization process is further developed by using iterative re-weighted l1norm minimization, helping select the least number of the sparse elements and impose the required constraints on the array radiation pattern. Furthermore, the nulls generated are wide enough to cancel a whole specific sidelobe. Simulation results demonstrate the effectiveness of the proposed method and the required nulls are placed with a minimum number of perturbed elements. Thus, in practical implementations of the proposed method, a highly limited number of attenuators and phase shifters is required compared to other, conventional methods. Keywords—compressed sensing, convex optimization, iterative re-weighted l1norm minimization, linear and planar arrays.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123758951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
COVID-19 Pandemic and Internet Traffic in Poland: Evidence from Selected Regional Networks COVID-19大流行和波兰的互联网流量:来自选定区域网络的证据
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.154721
M. Karpowicz
{"title":"COVID-19 Pandemic and Internet Traffic in Poland: Evidence from Selected Regional Networks","authors":"M. Karpowicz","doi":"10.26636/jtit.2021.154721","DOIUrl":"https://doi.org/10.26636/jtit.2021.154721","url":null,"abstract":"The COVID-19 pandemic has forced governments all over the world to impose lockdowns keeping citizens at home in order to limit the virus spread rate. The paper compares weekly traffic samples captured in the selected nodes of the network managed by NASK - National Research Institute during the pre-lockdown period, i.e. between January 27 and February 3, 2020, with those captured between March 30 and April 6, 2020, i.e. after the lockdown was announced. The presented results show changes in network traffic observed during the periods of time in question and illustrate the evolution in the popularity of top network services. © 2021 National Institute of Telecommunications. All rights reserved.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing RF Power Sensor Calibration Station in Direct Comparison Transfer System using Vector Network Analyzer 利用矢量网络分析仪开发直接比较传输系统中的射频功率传感器校准站
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.155021
Jarosław Szatkowski
{"title":"Developing RF Power Sensor Calibration Station in Direct Comparison Transfer System using Vector Network Analyzer","authors":"Jarosław Szatkowski","doi":"10.26636/jtit.2021.155021","DOIUrl":"https://doi.org/10.26636/jtit.2021.155021","url":null,"abstract":"Calibration of RF power sensors is crucial issue in RF power measurements. Many calibration laboratories use the direct comparison transfer system with a signal generator and a power splitter. Increasing performance of modern vector network analyzers makes it possible to perform a power sensor calibration with acceptable uncertainties. The main advantage when using a VNA is a simple measurement setup with a wide frequency range (up to 50 GHz, limited only by the VNA and the standard power sensor), where all of required components, i.e. signal generator, a directional coupler and a reference power indicator are built in the VNA technology. This paper reports performing a VNA-based RF power sensors calibration for 10 MHz – 18 GHz band, carried out in the Laboratory of Electric, Electronic and Optoelectronic Metrology at the National Institute of Telecommunications in Warsaw, Poland. In order to validate the proposed solution two of power sensors were calibrated at a reference laboratory. The validation consisted of two steps. At first, one of those characterized power sensors was calibrated at our laboratory in direct comparison transfer system. Finally, the results obtained from the VNA-based system were compared with the previously obtained ones. Keywords—direct comparison transfer, microwave power measurements, power sensor calibration, measurement uncertainty, VNA.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126255183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Classification in an NFV Environment using Supervised ML Algorithms NFV环境中使用监督ML算法的网络流量分类
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.153421
G. Ilievski, P. Latkoski
{"title":"Network Traffic Classification in an NFV Environment using Supervised ML Algorithms","authors":"G. Ilievski, P. Latkoski","doi":"10.26636/jtit.2021.153421","DOIUrl":"https://doi.org/10.26636/jtit.2021.153421","url":null,"abstract":"We have conducted research on the performance of six supervised machine learning (ML) algorithms used for network traffic classification in a virtual environment driven by network function virtualization (NFV). The performancerelated analysis focused on the precision of the classification process, but also in time-intensity (speed) of the supervised ML algorithms. We devised specific traffic taxonomy using commonly used categories, with particular emphasis placed on VoIP and encrypted VoIP protocols serve as a basis of the 5G architecture. NFV is considered to be one of the foundations of 5G development, as the traditional networking components are fully virtualized, in many cases relaying on mixed cloud solutions, both of the premiseand public cloud-based variety. Virtual machines are being replaced by containers and application functions while most of the network traffic is flowing in the east-west direction within the cloud. The analysis performed has shown that in such an environment, the Decision Tree algorithm is best suited, among the six algorithms considered, for performing classification-related tasks, and offers the required speed that will introduce minimal delays in network flows, which is crucial in 5G networks, where packet delay requirements are of great significance. It has proven to be reliable and offered excellent overall performance across multiple network packet classes within a virtualized NFV network architecture. While performing the classification procedure, we were working only with the statistical network flow features, leaving out packet payload, source, destinationand port-related information, thus making the analysis valid not only from the technical, but also from the regulatory point of view. Keywords—classification, machine learning, network functions virtualization, network traffic.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125205699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Markov Decision Process based Model for Performance Analysis an Intrusion Detection System in IoT Networks 基于马尔可夫决策过程的物联网入侵检测系统性能分析模型
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.151221
Gauri Kalnoor, G. S
{"title":"Markov Decision Process based Model for Performance Analysis an Intrusion Detection System in IoT Networks","authors":"Gauri Kalnoor, G. S","doi":"10.26636/jtit.2021.151221","DOIUrl":"https://doi.org/10.26636/jtit.2021.151221","url":null,"abstract":"In this paper, a new reinforcement learning intrusion detection system is developed for IoT networks incorporated with WSNs. A research is carried out and the proposed model RL-IDS plot is shown, where the detection rate is improved. The outcome shows a decrease in false alarm rates and is compared with the current methodologies. Computational analysis is performed, and then the results are compared with the current methodologies, i.e. distributed denial of service (DDoS) attack. The performance of the network is estimated based on security and other metrics. Keywords—DDoS, intrusion detection, IoT, machine learning, Markov decision process (MDP), Q-learning, NSL-KDD, reinforcement-learning.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Temperature Effects in Fused Silica Optical Fibers 熔融石英光纤中的高温效应
Journal of Telecommunictions and Information Technology Pub Date : 2021-09-30 DOI: 10.26636/jtit.2021.153521
K. Borzycki, M. Jaworski, T. Kossek
{"title":"High Temperature Effects in Fused Silica Optical Fibers","authors":"K. Borzycki, M. Jaworski, T. Kossek","doi":"10.26636/jtit.2021.153521","DOIUrl":"https://doi.org/10.26636/jtit.2021.153521","url":null,"abstract":"Fire-resistant fiber optic cables used in safety and monitoring systems playing an essential role in fire fighting and building evacuation procedures are required to temporarily maintain optical continuity when exposed to fire. However, the use of fused silica fiber at temperatures between 800C and 1000C is associated with two highly undesirable phenomena. Thermal radiation (incandescence) of optical fibers, with its intensity and spectral distribution being proportional to additional attenuation observed in the fiber’s hydroxyl absorption bands (“water peaks”) is one of them. The other consists in penetration of thermal radiation from the surroundings into the fiber, due to defects in glass, causing light scattering and resulting in fiber brittleness. Thermal radiation is a source of interference in fiber attenuation measurements performed during fire tests and affects normal operation of fiber optic data links in the event of a fire. In this article, results of laboratory tests performed on a telecom single mode and multimode fibers subjected to temperatures of up to 1000C are presented. Keywords—fire-resistant fiber optic cable, fire test, fused silica optical fiber, incandescence spectrum, thermal deterioration, thermal radiation.","PeriodicalId":227678,"journal":{"name":"Journal of Telecommunictions and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信