2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)最新文献

筛选
英文 中文
Next-Generation Network Intrusion Detection System (NG-NIDS) 下一代网络入侵检测系统(NG-NIDS)
Yazan Alnajjar, Jinane Mounsef
{"title":"Next-Generation Network Intrusion Detection System (NG-NIDS)","authors":"Yazan Alnajjar, Jinane Mounsef","doi":"10.1109/TELSIKS52058.2021.9606424","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606424","url":null,"abstract":"This paper introduces the Next-Generation Network Intrusion Detection System (NG-NIDS) with intelligent capabilities based on the Artificial Neural Networks (ANN) and Machine Learning (ML) algorithms. The results have been achieved by training the model on a benign as well as malicious traffic. The proposed NG-NIDS achieved 99.9% accuracy of detecting the malicious traffic, which reflects the fact that this design is accurate and reliable.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotic Analysis of Physical Layer Security versus Reliability in IoT Wireless Transmission 物联网无线传输物理层安全性与可靠性的渐近分析
Srđan Maričić, D. Milic, N. Milosevic, J. Anastasov, P. Císar
{"title":"Asymptotic Analysis of Physical Layer Security versus Reliability in IoT Wireless Transmission","authors":"Srđan Maričić, D. Milic, N. Milosevic, J. Anastasov, P. Císar","doi":"10.1109/TELSIKS52058.2021.9606421","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606421","url":null,"abstract":"In this paper, we investigate security-reliability tradeoff on physical layer in Internet of Things (IoT) network, when an eavesdropper tries to intercept secure transmission. The best-node scheduling scheme is employed as an auxiliary tool to decrease probability of intercept. The main and also wiretap channels are assumed to be subjected to composite generalized-K fading. Asymptotic expression of security versus reliability, valid in the range of medium to high average main-to-eavesdropper’s signal ratio (MER) values, is derived. The impact of different system parameters such as IoT network dimension, fading/shadowing conditions, path loss and average MER on intercept probability versus outage probability is observed, and then accompanying numerical results are shown.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Session: Advanced Sensor Technologies in Biomedical Applications and Healthcare 特别会议:生物医学应用和医疗保健中的先进传感器技术
{"title":"Special Session: Advanced Sensor Technologies in Biomedical Applications and Healthcare","authors":"","doi":"10.1109/telsiks52058.2021.9606295","DOIUrl":"https://doi.org/10.1109/telsiks52058.2021.9606295","url":null,"abstract":"","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Electromagnetics & EMC 计算电磁学与电磁兼容
{"title":"Computational Electromagnetics & EMC","authors":"","doi":"10.1109/telsiks52058.2021.9606313","DOIUrl":"https://doi.org/10.1109/telsiks52058.2021.9606313","url":null,"abstract":"","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of K-band Crossed Slot and Crossed Dipole Antennas k波段交叉缝隙与交叉偶极子天线的比较分析
M. Milijić, B. Jokanović, Luka Lazovic
{"title":"Comparative Analysis of K-band Crossed Slot and Crossed Dipole Antennas","authors":"M. Milijić, B. Jokanović, Luka Lazovic","doi":"10.1109/TELSIKS52058.2021.9606327","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606327","url":null,"abstract":"In this paper a comparison between the crossed dipole and the corresponding crossed slot antennas intended for K-band applications has been presented. The analysis of the crossed slot and dipole antennas which are complementary structures is carried out to investigate their performances focusing with two objectives: one is to study their advantages as the single radiating elements suitable for energy harvesting applications and the other is to evaluate their applicability as a radiating element in an array. Therefore, both antennas were simulated and optimized at 25.875 GHz on the same substrate with added parallel reflector plate. The simulated results are presented and discussed.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Affordable Pedagogical Setup for Wave-particule Duality and Applications to Chaotic Stadium Cavity 波粒二象性的可负担教学设置及其在体育场混沌腔中的应用
Olivier Leblanc, L. Tadrist, N. Moreau, B. Brun, T. Gilet, B. Hackens
{"title":"An Affordable Pedagogical Setup for Wave-particule Duality and Applications to Chaotic Stadium Cavity","authors":"Olivier Leblanc, L. Tadrist, N. Moreau, B. Brun, T. Gilet, B. Hackens","doi":"10.1109/TELSIKS52058.2021.9606385","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606385","url":null,"abstract":"Walking droplets represent an ideal playground to explore wave-particle duality at the macroscopic scale. The proper control and measurement of such system requires several experimental tools that are not often easily affordable at undergraduate level. This paper proposes a complete low-cost and open-source experimental setup for walking droplets with a performance characterization. The setup is tested by examining the behaviour of droplets in the stadium billiard, a two-dimensional concave cavity that yields chaotic trajectories. Drastic differences between classical and quantum particles behaviour were observed in such geometry. In particular, the long-term evolution of walking droplets in a stadium billiard presents clear scarring patterns, informing on the existence of preferred \"probable positions\" within the billiard.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultramarathon Result and Injury Prediction using PyTorch 使用PyTorch的超级马拉松结果和损伤预测
Valentina Nejkovic, Masa Radenkovic, N. Petrovic
{"title":"Ultramarathon Result and Injury Prediction using PyTorch","authors":"Valentina Nejkovic, Masa Radenkovic, N. Petrovic","doi":"10.1109/TELSIKS52058.2021.9606348","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606348","url":null,"abstract":"In this paper, it is explored how the data about trainings, competitions and weather can be leveraged for result and injury prediction in competitive running disciplines. As outcome, two prediction models based on multilayer neural networks are implemented using PyTorch framework for Python programming language and evaluated on dataset containing realistic data of ultramarathon runner. The first model treats problem as regression to predict the number of kilometers run for given ultramarathon duration, while another one determines whether injury will occur for given running distance or no using classification approach. According to our results, both models show satisfiable performance (up to 2% relative error for regression, 70% correct for classification), while the first one performs better, which can be explained by lack of enough injury records in the second case. Moreover, a companion mobile app developed using AppSheet and Google Apps Script for automated dataset construction is introduced.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental Investigation on the Bias and Temperature Dependence of the Forward Transmission Coefficient for HEMT Technologies HEMT前向传输系数的偏置和温度依赖性实验研究
M. Alim, C. Gaquière, G. Crupi
{"title":"Experimental Investigation on the Bias and Temperature Dependence of the Forward Transmission Coefficient for HEMT Technologies","authors":"M. Alim, C. Gaquière, G. Crupi","doi":"10.1109/TELSIKS52058.2021.9606356","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606356","url":null,"abstract":"The goal of this research is to look at the effects of temperature on the forward transmission coefficient (S21) of high electron-mobility transistors (HEMTs), employing various technologies. The analysis is carried out on six different devices under different bias conditions with the ambient temperature varied from -40°C to 150°C. The low-frequency magnitude of S21 is significantly reduced in GaN-based HEMTs when the temperature is increased. On the other hand, an operating bias point where this magnitude is temperature insensitive has been identified in GaAs-based HEMTs.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Algorithm for the VLSI Implementation of Inverse DCT Based on Quasi-Circular Correlation Structures 一种基于准圆相关结构的逆DCT VLSI实现算法
D. Chiper, L. Cotorobai
{"title":"An Efficient Algorithm for the VLSI Implementation of Inverse DCT Based on Quasi-Circular Correlation Structures","authors":"D. Chiper, L. Cotorobai","doi":"10.1109/TELSIKS52058.2021.9606373","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606373","url":null,"abstract":"This paper proposes a new VLSI algorithm for a inverse discrete cosine transform (IDCT) designed for an efficient implementation of the obfuscation technique. The proposed algorithm is using quasi-circular correlation structures and is highly regular and modular. The method presents a low hardware complexity, a high throughput and it can be mapped using a low number of I/O channels which in turn translates to a low bandwidth on linear systolic arrays. Additionally, most of the parts of the architecture are working at a significantly lower frequency than the main systolic array. Using the time-varying obfuscation method, the proposed algorithm presents the additional advantage in the field of hardware security and it can be efficiently implemented on a VLSI chip with a low power consumption due to its low hardware complexity.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121006905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physical Layer Communication Security in Smart Cities: Challenges and Threats Identification 智慧城市物理层通信安全:挑战与威胁识别
M. Simić, M. Stanković, V. Orlic
{"title":"Physical Layer Communication Security in Smart Cities: Challenges and Threats Identification","authors":"M. Simić, M. Stanković, V. Orlic","doi":"10.1109/TELSIKS52058.2021.9606370","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606370","url":null,"abstract":"Communication technologies will have tremendous presence in modern smart cities, providing means for massive data collection, plethora of services and technical management and control. However, as the complexity of the underlying communication systems increases, so do the security challenges and risks, which raises concerns about the smart city technology in general. Standard communication security approaches implemented in conventional wireless and wired networks are typically focused only on specific protocols and communication schemes, and, hence, are not well grounded for smart cities from the complexity and diversity point of view. In this paper, we discuss physical layer communication security challenges and risks in smart cities. We argue that, besides higher-level information protection, an appropriate framework for intrusion detection and threat/attack classification and identification is of utmost importance. For this purpose, we propose to use methods based on applying automatic modulation classification (AMC) systems. We provide overview of the appropriate AMC schemes, and discuss their properties, advantages and disadvantages in tackling the security challenges.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121408843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信