International Conference on Ultra Modern Telecommunications最新文献

筛选
英文 中文
On Application of Parabolic Equation Method to Propagation Modeling in Millimeter-Wave Bands 抛物方程法在毫米波波段传播建模中的应用
International Conference on Ultra Modern Telecommunications Pub Date : 2018-11-01 DOI: 10.1109/ICUMT.2018.8631206
M. Lytaev, A. Vladyko
{"title":"On Application of Parabolic Equation Method to Propagation Modeling in Millimeter-Wave Bands","authors":"M. Lytaev, A. Vladyko","doi":"10.1109/ICUMT.2018.8631206","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631206","url":null,"abstract":"This research studies the millimeter-wave (mmWave) propagation mechanisms and corresponding numerical methods. 5G mobile communication systems are expected to operate in mmWave bands, thus the development of the mmWave propagation models is vital for the wireless communication study. In contrast to most other publications, this research is based on the electromagnetic theory and rigorous differential equations. Diffraction, scattering, refraction and attenuation of the radio waves can be computed and visualized. Arbitrary terrain profiles and weather conditions can be accounted. The widely used parabolic equation (PE) framework is applied. State-of-the-art PE based numerical methods are considered with a focus on the mmWave propagation. Numerical examples under various propagation conditions are given.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Current interoperability of electrical systems 当前电气系统的互操作性
International Conference on Ultra Modern Telecommunications Pub Date : 2012-10-01 DOI: 10.1109/ICUMT.2012.6459702
L. D. Andrade, T. Leao
{"title":"Current interoperability of electrical systems","authors":"L. D. Andrade, T. Leao","doi":"10.1109/ICUMT.2012.6459702","DOIUrl":"https://doi.org/10.1109/ICUMT.2012.6459702","url":null,"abstract":"The main objective of this work is to explore interoperability issues in power systems management. Technology information systems offer the ability to exchange information to enhance operational and financial effectiveness and take the most of automation systems acting online.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131149977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints 基于离散分数傅里叶变换和拼图变换的图像加密。案例研究:指纹
International Conference on Ultra Modern Telecommunications Pub Date : 2009-12-04 DOI: 10.1109/ICUMT.2009.5345645
J. Vilardy, C. Torres, L. Mattos
{"title":"Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints","authors":"J. Vilardy, C. Torres, L. Mattos","doi":"10.1109/ICUMT.2009.5345645","DOIUrl":"https://doi.org/10.1109/ICUMT.2009.5345645","url":null,"abstract":"A new images encryption method using The Discrete Fractional Fourier Transform (DFrFT) and the Jigsaw transform is proposed. The main feature of this encryption scheme is that the encrypted image is real and has the same size as the original one, being this encrypted image much more convenient for either its storage or its transmission on digital communication networks. Using the Jigsaw transform the security of the encrypted image is increased and the random phase masks used in many images cryptosystems based on Fractional Fourier Transform (FrFT) are eliminated. Finally, for the new proposed encryption method, a fingerprint encryption digital algorithm was developed. There are twelve keys used in the cryptographic algorithm implemented, which are constituted by the six DFrFTs fractional orders and the six random permutations used in Jigsaw transform; all these keys are necessary for a correct decryption, obtaining a high level security in protecting fingerprints for a particular application.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116704271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Queueing systems with general renovation 具有一般改造的排队系统
International Conference on Ultra Modern Telecommunications Pub Date : 2009-12-04 DOI: 10.1109/ICUMT.2009.5345382
I. Zaryadov
{"title":"Queueing systems with general renovation","authors":"I. Zaryadov","doi":"10.1109/ICUMT.2009.5345382","DOIUrl":"https://doi.org/10.1109/ICUMT.2009.5345382","url":null,"abstract":"Multi-server queueing systems with complete and general renovation are revised. Such models are often encountered in computer science applications. Methods of analysis for the queues with general(recurrent) input flow and exponential service time with different combinations of service and general renovation disciplines are discussed. Explicit solutions (the steady-state probabilitiy distribution , loss and service probabilities for arriving customers, waiting time for lost and serviced customers) are proposed.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Game Theoretic Approach for Efficient Resource Allocation in 5G Networks 5G网络资源高效分配的博弈论方法
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT57764.2022.9943431
Aspasia Koukouvela, Christos Bouras, V. Kokkinos, A. Gkamas, P. Pouyioutas
{"title":"A Game Theoretic Approach for Efficient Resource Allocation in 5G Networks","authors":"Aspasia Koukouvela, Christos Bouras, V. Kokkinos, A. Gkamas, P. Pouyioutas","doi":"10.1109/ICUMT57764.2022.9943431","DOIUrl":"https://doi.org/10.1109/ICUMT57764.2022.9943431","url":null,"abstract":"Heterogeneous Networks (HetNets), which enable rapid expansion in mobile traffic, have been hailed as a critical technology for 5G communications. HetNets could increase the network's capacity and enable it to support additional users. However, interference between different cells makes Quality of Service (QoS) more challenging, and thus innovative protocols, and emerging trends should be incorporated to provide Resource Allocation efficiency (RA). Concepts provided from Game Theory (GT) have been widely applied to a variety of problems where the actions of one may influence or even conflict with those of others. As a result, game formulations are utilized, and the idea of equilibrium is applied to find a stable solution for all participants. In this paper, we compare two algorithms used for RA, the first being a classical RA algorithm and the second being a game theoretic one. The game implemented is called “Tragedy of the Commons” and is applied in a non-cooperative network.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical concerns of implementing machine learning algorithms for W-LAN location fingerprinting
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT.2014.7002120
Jörg Schäfer
{"title":"Practical concerns of implementing machine learning algorithms for W-LAN location fingerprinting","authors":"Jörg Schäfer","doi":"10.1109/ICUMT.2014.7002120","DOIUrl":"https://doi.org/10.1109/ICUMT.2014.7002120","url":null,"abstract":"In the past, fingerprinting algorithms have been suggested as a practical and cost-effective means for deploying localisation services. Previous research, however, often assumes an (idealised) laboratory environment rather than a realistic set-up. In our work we analyse challenges occurring from a university environment which is characterised by hundreds of access points deployed and by heterogeneous mobile handsets of unknown technical specifications and quality. Our main emphasis lies on classification results for room detection. We analyse the problems caused by the huge number of access points available and by the heterogenous handsets. We show that standard techniques well-known in machine learning such as feature selection and dimensionality reduction do work. We also provide evidence that pre-processing techniques suggested previously in a laboratory set-up do not improve accuracy.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Online adaptive compensation scheme for inverter nonlinearity in PMSM drive 永磁同步电动机逆变器非线性在线自适应补偿方案
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT.2015.7382422
Ludek Buchta, Lukáš Otava
{"title":"Online adaptive compensation scheme for inverter nonlinearity in PMSM drive","authors":"Ludek Buchta, Lukáš Otava","doi":"10.1109/ICUMT.2015.7382422","DOIUrl":"https://doi.org/10.1109/ICUMT.2015.7382422","url":null,"abstract":"In this paper, a simple parameter-independent adaptive method to compensate dead-time effects and nonlinearity of a inverter is presented. The proposed approach is based on the monitoring of harmonic distortion in the d-axis current. Consequently, the criterion is calculated and minimized. The output of the proposed adaptive method is one slowly time-varying voltage, which is used to compensate the output voltage distortion. This approach is extended by estimator of persistent voltage disturbance based on the model of the permanent-magnet synchronous motor (PMSM). The effectiveness of the proposed approach is verified through the simulation experiments.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to Decompilation 利用抗反编译的数字水印隐藏嵌入检测信息系统中java模块替换的技术
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT54235.2021.9631736
P. I. Sharikov, A. Krasov, Artem Gelf, Ernest Birikh
{"title":"A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to Decompilation","authors":"P. I. Sharikov, A. Krasov, Artem Gelf, Ernest Birikh","doi":"10.1109/ICUMT54235.2021.9631736","DOIUrl":"https://doi.org/10.1109/ICUMT54235.2021.9631736","url":null,"abstract":"The relevance of the problem under study is due to the rapid development of the java programming language, a large number of commercial applications written in this programming language. The purpose of the article is to develop a methodology that allows you to determine the java-module of the information system, which does not contain a hidden digital watermark. It is necessary that the digital watermark is not damaged during the decompilation of the entire system in order to replace the java module, and that the class files and the entire information system function unchanged. Thus, at first, a digital watermark is hidden in all java-modules of the information system. Next, we check the resistance of the digital watermark to decompilation attacks with block substitution. The materials of the article can be useful in the implementation of hidden embedding of a digital watermark in the class files of a large java module.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aircraft evasive maneuver trajectory optimization based on QPSO 基于QPSO的飞机规避机动轨迹优化
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT.2010.5676603
Xiaoping Wang, Qin-ying Lin, Xin-min Dong
{"title":"Aircraft evasive maneuver trajectory optimization based on QPSO","authors":"Xiaoping Wang, Qin-ying Lin, Xin-min Dong","doi":"10.1109/ICUMT.2010.5676603","DOIUrl":"https://doi.org/10.1109/ICUMT.2010.5676603","url":null,"abstract":"This paper introduces a parameterization method for obtaining closed-loop suboptimal solutions to the aircraft evasive maneuver problem, which is transformed into a nonlinear programming problem using Quantum-behaved Particle Swarm Optimization (QPSO) algorithm based on rolling optimization concept. Considering the aircraft sensitivity constraints, angle of attack and bank angle accelerations are chosen as the decision variables, which guarantee feasibility of the aircraft evasive maneuver trajectory with reduced inequality constraints. Simulation shows that the method presented is of high effectiveness.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Queueing Model of Hysteretic Congestion Control for Cloud Wireless Sensor Networks 云无线传感器网络迟滞拥塞控制的排队模型
International Conference on Ultra Modern Telecommunications Pub Date : 1900-01-01 DOI: 10.1109/ICUMT54235.2021.9631576
A. Bashir, Egor Machnev, E. Mokrov
{"title":"Queueing Model of Hysteretic Congestion Control for Cloud Wireless Sensor Networks","authors":"A. Bashir, Egor Machnev, E. Mokrov","doi":"10.1109/ICUMT54235.2021.9631576","DOIUrl":"https://doi.org/10.1109/ICUMT54235.2021.9631576","url":null,"abstract":"This paper considers a Hysteretic congestion control model to mitigate congestion problems on WSN gateway. We model the system as a queueing system with two thresholds working under three modes: normal mode, reduced load mode and deny mode. We consider average number of requests in the system and blocking probability as the performance metrics and compare the acquired results against the results for IRED algorithm.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信