Haris Turkmanović, I. Popović, Zoran Čiča, D. Drajić
{"title":"Simulation framework for performance analysis in multi-tier IoT Systems","authors":"Haris Turkmanović, I. Popović, Zoran Čiča, D. Drajić","doi":"10.1109/TELFOR52709.2021.9653170","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653170","url":null,"abstract":"The accelerated development of technologies, especially in the field of telecommunications has enabled the easier integration of embedded devices within various IoT applications. Modern IoT applications involve the integration of multiple embedded devices that collect and process data but also communicate with other tiers of the IoT system architecture. Designing multi-tier IoT system, even in the case of architecture involving a small number of intelligent embedded devices, can be a very demanding process especially when it is necessary to meet the strict requirements of IoT application. In this paper, an open-source simulation framework that allows the performance analysis of an arbitrary multi-tiered IoT system is presented and evaluated. Framework enables insight into the data availability within each tier of IoT system architecture which allows designers to analyze the performance of IoT application. Developed simulation framework enables analyzes of different performance parameters such as real-time performance, energy consumption, architecture scalability, and others. The example of a large-scale IoT application is used to demonstrate the potential of the developed open-source simulator when it is necessary to quantify scalability of the selected architecture of the IoT system.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Selena Vasić, D. Milic, N. Petrovic, S. Suljovic, Samir Koničanin
{"title":"GPU-enabled Framework for Modelling and Simulation of Outage Probability in Smart Cities Mobile Networks Limited by α-k-µ Fading and α-η-µ Co-channel Interference","authors":"Selena Vasić, D. Milic, N. Petrovic, S. Suljovic, Samir Koničanin","doi":"10.1109/TELFOR52709.2021.9653334","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653334","url":null,"abstract":"In this paper we have conducted an analysis of the receiver with selection combining (SC) in the presence of α-k-µ multipath fading and α-η-µ distributed co-channel interference (CCI). An expression for outage probability (Pout) has been derived and discussed in terms of fading parameters α, k, and µ as well as interference parameter η and number of branches in a diversity receiver. Simulation environment for the proposed scenario is introduced for a network modelling and simulation. The presented General-Purpose Graphics Processing Unit (GPGPU) framework with linear optimization enhances the efficiency of Pout calculations and allows for enhancing the Quality of Service (QoS) and cost reduction of the implementation of this model in smart cities.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of coordinated prosumer operation on power distribution systems","authors":"Maro Jelić, D. Šošić, Nikola M. Tomasevic","doi":"10.1109/TELFOR52709.2021.9653268","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653268","url":null,"abstract":"The proliferation of distributed renewable energy sources and energy storage systems has presented a number of challenges for contemporary power systems. Depending on the control strategies that the users employ, the grid may experience varying levels of equipment loading. This paper aims to explore the effects on the grid from coordinated operation of energy prosumers at various levels of prosumer penetration. The results obtained by the numerical simulations depicted herein show that the differences in operating modes at high prosumer penetration levels can result in a reduction of over 2.5% in terms of peak grid transformer loading at the expense of an approximate 0.75% increase of average energy consumption.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125647712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Theoretical Efficiency Analysis of Doherty Power Amplifiers built with Different Amplifier Classes","authors":"A. Tunç, M. B. Yelten","doi":"10.1109/TELFOR52709.2021.9653262","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653262","url":null,"abstract":"In this study, the efficiency performance of various classes in a Doherty power amplifier is investigated through theoretical calculations. Class-AB, B, and F power amplifiers are chosen as the carrier amplifier that has an equal power level with the peaking amplifier. After performing the theoretical calculations, efficiency graphs are drawn for each power amplifier class versus the normalized output power level. Also, results are compared and discussed in terms of efficiency performance.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic solar panel cleaning system Design","authors":"Ali Al Dahoud, M. Fezari, Ahmad Al Dahoud","doi":"10.1109/TELFOR52709.2021.9653215","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653215","url":null,"abstract":"This paper aims to develop an automatic1 cleaning system for Photovoltaic (PV) solar panels installed on the roof of University Al-Zaytoonah faculty of IT in Jordan. The experiments were done at University Badji Mokhtar Annaba Algeria. We designed a dust detector and perform tests on it for calibration. The brain of the system is an Arduino Uno microcontroller, which gets data from the dust sensor then makes treatment and sends instructions to the system to perform the cleaning process. The cleaning process is based on-power circuit that controls the speed and direction of a motor to scan all surface of the PV panel. GUI was developed to monitor the system and sensor status. The collected data is transmitted to the central unit. Finally, the primary results obtained to meet our expatiations for optimizing the efficiency of the solar panels.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modified Whale Optimization Algorithm for Enhancing the Features Selection Process in Machine Learning","authors":"Ezaz Uddin Syed, M. Masood, M. Fouad, I. Glesk","doi":"10.1109/TELFOR52709.2021.9653166","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653166","url":null,"abstract":"In recent years, when there is an abundance of large datasets in various fields, the importance of feature selection problem has become critical for researchers. The real world applications rely on large datasets, which implies that datasets have hundreds of instances and attributes. Finding a better way of optimum feature selection could significantly improve the machine learning predictions. Recently, metaheuristics have gained momentous popularity for solving feature selection problem. Whale Optimization Algorithm has gained significant attention by the researcher community searching to solve the feature selection problem. However, the exploration problem in whale optimization algorithm still exists and remains to be researched as various parameters within the whale algorithm have been ignored. This paper proposes a new and improved version of the whale algorithm entitled Modified Whale Optimization Algorithm (MWOA) that hybrid with the machine learning models such as logistic regression, decision tree, random forest, K-nearest neighbor, support vector machine, naïve Bayes model. To test this new approach and the performance, the breast cancer dataset was used for MWOA evaluation. The test results revealed the superiority of this model when compared to the results obtained by machine learning models.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Mohamed, U. Khan, Mohsin Raza, Khaoula Abogila, M. Mohammed, Mohammed Alhaj
{"title":"An Analysis and Comparison of Partial Discharge Signal Detection and Localization using SDR and radiometric sensor","authors":"H. Mohamed, U. Khan, Mohsin Raza, Khaoula Abogila, M. Mohammed, Mohammed Alhaj","doi":"10.1109/TELFOR52709.2021.9653331","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653331","url":null,"abstract":"Partial Discharge (PD) is an electrical discharge that occurs within part of the dielectric between two High Voltage (HV) conductors. PD causes damage to the dielectric which typically deteriorates with time. If left untreated, PD may result in catastrophic insulation failure, HV equipment destruction, and power supply disruption. PD detection plays a vital role in electrical power stations, it can help protect HV equipment. In this paper a comparison between two PD detection systems is presented. These systems are: PD detection system based on SDR technology, and PD detection system based on Radiometric sensors. Both systems can be deployed in a network to perform as a wireless sensor network. Results obtained using SDR technology are then compared to results obtained with the radiometric sensor.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Milutin Marenović, Dragomir El Mezeni, L. Saranovac
{"title":"Reprodukcija binauralnog signala sa efektom prostorije snimanim neusmerenim mikrofonima korišćenjem ambisonik pristupa","authors":"Milutin Marenović, Dragomir El Mezeni, L. Saranovac","doi":"10.1109/TELFOR52709.2021.9653315","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653315","url":null,"abstract":"Obrada audio signala za aplikacije virtuelne real-nosti podrazumeva proceduru reprodukcije binauralnog signala i proceduru dodavanja efekta prostorije. Pri rešavanju ovog problema, danas se najčešće koristi ambisonik pristup za koji je potrebno snimiti setove impulsnih odziva prostorija (RIR) i setove impulsnih odziva vezanih za anatomiju glave slušalaca (HRIR). Za snimanje impulsnih odziva prostorije koji se koriste pri ambisonik procesiranju potrebno je koristiti ambisonik mikrofon, koji na današnjem tržištu može biti dosta skup i nepristupačan. U ovom radu opisan je metod za ambisonik procesiranje koji izbegava korišćenje ambisonik mikrofona.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[TELFOR 2021 Front cover]","authors":"","doi":"10.1109/telfor52709.2021.9653212","DOIUrl":"https://doi.org/10.1109/telfor52709.2021.9653212","url":null,"abstract":"","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125413934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. O. Nyangaresi, Z. Abduljabbar, Mustafa A. Al Sibahee, I. Q. Abduljaleel, Enas Wahab Abood
{"title":"Towards Security and Privacy Preservation in 5G Networks","authors":"V. O. Nyangaresi, Z. Abduljabbar, Mustafa A. Al Sibahee, I. Q. Abduljaleel, Enas Wahab Abood","doi":"10.1109/TELFOR52709.2021.9653385","DOIUrl":"https://doi.org/10.1109/TELFOR52709.2021.9653385","url":null,"abstract":"The Fifth Generation (5G) networks support various service delivery models such as Device to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc Networks (VANETS) among others. In these networks, massive personal and private data items are being exchanged among numerous heterogeneous devices. As such, security and privacy leaks can have devastating repercussions. Many protocols have been presented for device authentication, starting with Authentication and Key Agreement (AKA) introduced by the Third-Generation Partnership Project (3GPP). Numerous attacks have been described against this AKA protocol and hence other schemes have been presented in literature. Although they address some of these security and privacy issues, some of these schemes are inefficient while others are still susceptible to other attacks. In this paper, a protocol that protects the exchanged packets against ephemeral leakages, man-in-the-middle, impersonation and offline guessing attacks is presented. In terms of bandwidth requirements and execution time, the proposed protocol had the lowest values among its peers.","PeriodicalId":330449,"journal":{"name":"2021 29th Telecommunications Forum (TELFOR)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126572279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}