2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)最新文献

筛选
英文 中文
Performance Evaluation for End-to-End Slice Management in 5G/B5G Cellular Networks 5G/B5G蜂窝网络端到端切片管理性能评估
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911525
Noor Mohammedali, T. Kanakis, Ali Al-Sherbaz, Michael Opoku Agyeman
{"title":"Performance Evaluation for End-to-End Slice Management in 5G/B5G Cellular Networks","authors":"Noor Mohammedali, T. Kanakis, Ali Al-Sherbaz, Michael Opoku Agyeman","doi":"10.23919/softcom55329.2022.9911525","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911525","url":null,"abstract":"End-to-End (E2E) virtual networks represent a key technology in future cellular networks. Generally, the E2E connection means each slice has an independent part of the RAN, User Plane Function (UPF) and the 5G Core. Within each slice, a subscriber may have one or more Quality of Service (QoS) flows. These flows only exist within the slices. According to the 3G Partnership Project (3GPP) Technical Specification (TS), it could be at most eight Single Network Slice Selection Assistance Informations (S- NSSAIs) in the Allowed list. Requested NSSAIs sent in signalling messages; registration request, accept and respectively; between the user and the network. These messages allow the network to select the serving Access and Mobility Management Function (AMF), network slices and Network Slice Instances (NSIs) for the user. The research idea is to improve the Quality of Service (QoS) and the Quality of Experience (QoE) for the user when connecting to different slices on the 5G systems. The slice performance for one slice should not be affected by other slice traffic. This paper evaluates the performance of E2E 5G slicing in terms of throughput, jitter, reliability, transmission rate and mobility under different circumstances. In the proposed system, the performance of the slice is checked when the user connects to eight slices or more at the same time. In addition, we propose a slice termination and connection algorithm that allows the user to register new slices. Moreover, the algorithm allows users who are already registered to be released after using slices, enabling more effective use of the network resources.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129053220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching & Learning Analytics for Data-Based Optimization of Teaching and Learning Processes in Courses with Blended Learning 混合学习课程中基于数据的教学和学习过程优化的教学和学习分析
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911349
L. Mehnen, B. Pohn, Matthias Blaickner, Thomas Mandl, I. Dregely
{"title":"Teaching & Learning Analytics for Data-Based Optimization of Teaching and Learning Processes in Courses with Blended Learning","authors":"L. Mehnen, B. Pohn, Matthias Blaickner, Thomas Mandl, I. Dregely","doi":"10.23919/softcom55329.2022.9911349","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911349","url":null,"abstract":"Learning Management Systems (LMS), such as Moodle, enable the rapid progress of digitisation in teaching, which is no longer only taking place in the lecture hall, but increasingly “online” and asynchronously. New didactic concepts (blended learning, “flipped classroom”) consist of alternating self-learning and face-to-face phases, with the former taking place in the LMS, i.e. online. However, no analysis has yet been carried out as to how students act with the material in the self-learning phase, or the teachers are not provided with any information about the learning progress of the students during the self-learning phase. In this paper, concepts of learning and teaching analytics are presented to answer these questions and to integrate the measures derived from them into the teaching processes in a sustainable manner.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121153741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Assessment on Interactive Detection of Code Smells 代码气味交互检测的实证评估
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911317
D. Albuquerque, Everton T. Guimarães, Alexandre Braga Gomes, M. Perkusich, H. Almeida, A. Perkusich
{"title":"Empirical Assessment on Interactive Detection of Code Smells","authors":"D. Albuquerque, Everton T. Guimarães, Alexandre Braga Gomes, M. Perkusich, H. Almeida, A. Perkusich","doi":"10.23919/softcom55329.2022.9911317","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911317","url":null,"abstract":"Code smell detection is traditionally supported by Non-Interactive Detection (NID) techniques, which enable devel-opers to reveal smells in later software versions. These techniques only reveal smells in the source code upon an explicit developer request and do not support progressive interaction with affect code. The later code smells are detected, the higher the effort to refactor the affected code. The notion of Interactive Detection (ID) has emerged to address NID's limitations. An ID technique reveals code smell instances without an explicit developer request, encouraging early detection of code smells. Even though ID seems promising, there is a lack of evidence concerning its impact on code smell detection. Our research focused on evaluating the effectiveness of the ID technique on code smell detection. For doing so, we conducted a controlled experiment where 16 subjects underwent experimental tasks. We concluded that using the ID technique led to an increase of 60% in recall and up to 13% in precision when detecting code smells. Consequently, developers could identify more refactoring opportunities using the ID technique than the NID.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123324591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Siamese Network for Content-Based Image Retrieval: Detection of Alzheimer's Disease from neuroimaging data 基于内容的图像检索的暹罗网络:从神经成像数据检测阿尔茨海默病
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911487
Ivana Marin, T. Marasovic, Sven Gotovac
{"title":"Siamese Network for Content-Based Image Retrieval: Detection of Alzheimer's Disease from neuroimaging data","authors":"Ivana Marin, T. Marasovic, Sven Gotovac","doi":"10.23919/softcom55329.2022.9911487","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911487","url":null,"abstract":"In recent years deep-learning methods have demon-strated impressive results in various domains of computer vision, including medical imaging. This paper examines the possibility of leveraging deep-learning concepts in designing a computer system that could help clinicians make accurate Alzheimer disease (AD) diagnosis by retrieving the most similar archived brain scans of patients with already known diagnoses. We implement a siamese network with ResNet-50 twin subnetworks and train it on the MRI data obtained from ADNI (Alzheimer's Disease Neu-roimaging Initiative) dataset. Four different approaches for slice extraction from MRI volume are considered: using the three slices from the same plane (axial, coronal or sagittal) and combining one slice from each plane. The final performance of the CBIR system on new patient's data based only on MR neuroimaging modality shows limited and comparable performance with all four approaches and leaves space for further enhancements, including complementing neuroimaging MRI data with other data modalities relevant for AD detection.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Least Action Principle in Electromagnetics: Part II: Derivation of Maxwell's Equations 电磁学最小作用原理回顾:第二部分:麦克斯韦方程组的推导
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911284
D. Poljak
{"title":"Review of Least Action Principle in Electromagnetics: Part II: Derivation of Maxwell's Equations","authors":"D. Poljak","doi":"10.23919/softcom55329.2022.9911284","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911284","url":null,"abstract":"The 2nd paper in three-part study deals with a derivation of Maxwell's equations by using Hamilton's principle in electromagnetics and Noether's theorem for fields. Kinematical Maxwell's equations are derived from gauge symmetry, while two dynamical Maxwell's equations are derived by minimizing the functional of electromagnetic energy. The corresponding Lagrangian is given as difference between energy stored in the magnetic and electric field respectively.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Multi-Layer Recurrent Neural Networks in the Congestion Analysis of TeraHertz B5G/6G MAC Mechanism 多层递归神经网络在太赫兹B5G/6G MAC机制拥塞分析中的影响
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911500
Djamila Talbi, Zoltán Gál
{"title":"Impact of Multi-Layer Recurrent Neural Networks in the Congestion Analysis of TeraHertz B5G/6G MAC Mechanism","authors":"Djamila Talbi, Zoltán Gál","doi":"10.23919/softcom55329.2022.9911500","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911500","url":null,"abstract":"Nowadays design of BSG/6G radio technologies require analysis based on simulations to determine optimum functioning properties. We executed ns-3 simulations to generate TeraHertz scale MAC event sequences. Standard communication proposal mechanism, called Adaptive Directional Antenna Protocol for Terahertz (ADAPT), was analysed by extract frame collision behaviour in the control plane of the high-speed channel. Seven step sizes of sector indexes with specific features were used at the base station to give access to the mobile terminals spread in 30 sectors of the circular radio cell. After presenting basic properties of the MAC mechanism we grouped collision sequences into four classes. Testing classifications were performed with three types of recurrent neural networks (RNN). Transfer learning was used to detect influence of the recurrent layers on the performance of the compound multilayer RNN. Complex metric was introduced to quantify the learning efficiency of the RNN. It was found that the proposed metric, called Weighted Accuracy-to- Time Ratio is able to characterize and compare in efficient manner goodness of different deep learning techniques used for evaluation of the ADAPT technology. This new metric quantifies transfer learning property and differentiates applicability of the most popular recurrent neural networks used in practice.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127842401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Topology Optimization of an Assembled 3D Printed Robot 装配式3D打印机器人的拓扑优化
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911410
I. Chavdarov, Bozhidar Naydenov, Kaloyan Yovchev, Lyubomira Miteva
{"title":"Topology Optimization of an Assembled 3D Printed Robot","authors":"I. Chavdarov, Bozhidar Naydenov, Kaloyan Yovchev, Lyubomira Miteva","doi":"10.23919/softcom55329.2022.9911410","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911410","url":null,"abstract":"This work presents the use of specialized software for topology optimization of all the links of an assembled 3D printed robot. The forces acting on the robot are determined, as well as their distribution. Various robot configurations are analyzed and the one that produces the maximum internal stresses is identified. A method for topology optimization of an entire robot in a given extreme configuration is presented. The internal stresses in different robot configurations are determined and the optimal shape of the links and the base is generated, in accordance with the functional requirements, applied loads and constraints. The results are presented graphically. A 3D printed prototype of the entire robot is created. Possible strategies for overall optimization of robots to cover the entire workspace are discussed.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124591968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Least Action Principle in Electromagnetics Part I: Derivation of Continuity Equation and Lorentz Force 电磁学最小作用原理述评第一部分:连续性方程和洛伦兹力的推导
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911297
Dragan Poliak
{"title":"Review of Least Action Principle in Electromagnetics Part I: Derivation of Continuity Equation and Lorentz Force","authors":"Dragan Poliak","doi":"10.23919/softcom55329.2022.9911297","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911297","url":null,"abstract":"The paper deals with a derivation of equation of continuity for electric charge and Lorentz force. Starting from Hamilton's principle in classical mechanics and applying., gauge invariance one obtains Lagrangian for a moving charged particle. Equation of continuity and Lorentz force are obtained from the corresponding Lagrangian. The mathematical details of the functional minimization are given in Appendices.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122508005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Approach based on vSDN to Optimize Power Consumption 一种基于vSDN的功耗优化方法
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911318
E. P. Neto, G. Callou
{"title":"An Approach based on vSDN to Optimize Power Consumption","authors":"E. P. Neto, G. Callou","doi":"10.23919/softcom55329.2022.9911318","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911318","url":null,"abstract":"Recently, Technology and the web had a fast evo-lution. Assuming this, Software-Defined Networking (SDN) has been conceived to offer tenants improved network management, allowing modern services in business features. Additionally, SDNs allow the creation of many different and independent virtual networks, called virtual SDNs (vSDNs). However, some issues are present, e.g., resilience (i.e., recovering after a determined equipment stop working) and power consumption optimization of topologies with idle devices. This paper proposes an approach based on vSDN that optimizes power consumption by switching off idle equipment. This approach assumes multiple tenants and creates vSDNs according to the considered network topology metrics (e.g., power usage effectiveness (PUE), delay, power con-sumption, packet loss, availability, and reliability). In addition, the Network Model Flow (NMF) is proposed to represent the data flow on the network. To optimize power consumption, we proposed an approach that put the idle devices into the sleep mode. In the experiments, the proposed strategy reduced the power consumption upper than 50%.","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125993247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Classification Results in Network Data Analysis using Interpretability Methods 利用可解释性方法改进网络数据分析中的分类结果
2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM) Pub Date : 2022-09-22 DOI: 10.23919/softcom55329.2022.9911501
Domazoj Begušić, Luke Frederick Walker, S. Krznarić, D. Pintar
{"title":"Improving Classification Results in Network Data Analysis using Interpretability Methods","authors":"Domazoj Begušić, Luke Frederick Walker, S. Krznarić, D. Pintar","doi":"10.23919/softcom55329.2022.9911501","DOIUrl":"https://doi.org/10.23919/softcom55329.2022.9911501","url":null,"abstract":"Developing network intrusion detection and prevention systems usually leverage a rule-based approach, which is derived from rules defined by network security experts who can utilize logic from both low and high network layers. However, in recent times, machine learning methods have also achieved promising results in developing Network Intrusion Detection Systems, and their popularity is steadily rising. Unfortunately, the usage of these machine learning methods in real-life problems has regularly proved that no good out-of-the-box solution exists for production or deployment. Also, due to the increasing volume and complexity of processed data that machine learning methods are faced with over time, improvements and adaptions are frequently required. As the problem at hand becomes more convoluted, so does the the nature of the applied solution. This complexity is further compounded by the fact that certain machine and deep learning methods intrinsically do not offer a way of understanding how they make decisions, effectively behaving like black boxes. All of this significantly lowers the understandability of implemented solutions in production environments that are already quite complex, which justifies the need of interpretability methods. While interpretability methods are commonly designed to be used by humans, in this paper we propose a way of improving a model's classification performance by applying data mining methods on explanation data generated by interpretability methods. The paper's main contribution is improving on a previously built network intrusion detection system through proposing an automated process of integrating explanations into original data with the purpose of improving the interpretability and score of the used machine learning model","PeriodicalId":261625,"journal":{"name":"2022 International Conference on Software, Telecommunications and Computer Networks (SoftCOM)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信