{"title":"On Application of Parabolic Equation Method to Propagation Modeling in Millimeter-Wave Bands","authors":"M. Lytaev, A. Vladyko","doi":"10.1109/ICUMT.2018.8631206","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631206","url":null,"abstract":"This research studies the millimeter-wave (mmWave) propagation mechanisms and corresponding numerical methods. 5G mobile communication systems are expected to operate in mmWave bands, thus the development of the mmWave propagation models is vital for the wireless communication study. In contrast to most other publications, this research is based on the electromagnetic theory and rigorous differential equations. Diffraction, scattering, refraction and attenuation of the radio waves can be computed and visualized. Arbitrary terrain profiles and weather conditions can be accounted. The widely used parabolic equation (PE) framework is applied. State-of-the-art PE based numerical methods are considered with a focus on the mmWave propagation. Numerical examples under various propagation conditions are given.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124446049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current interoperability of electrical systems","authors":"L. D. Andrade, T. Leao","doi":"10.1109/ICUMT.2012.6459702","DOIUrl":"https://doi.org/10.1109/ICUMT.2012.6459702","url":null,"abstract":"The main objective of this work is to explore interoperability issues in power systems management. Technology information systems offer the ability to exchange information to enhance operational and financial effectiveness and take the most of automation systems acting online.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131149977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Images encryption via Discrete Fractional Fourier Transform and Jigsaw transform. Case study: Fingerprints","authors":"J. Vilardy, C. Torres, L. Mattos","doi":"10.1109/ICUMT.2009.5345645","DOIUrl":"https://doi.org/10.1109/ICUMT.2009.5345645","url":null,"abstract":"A new images encryption method using The Discrete Fractional Fourier Transform (DFrFT) and the Jigsaw transform is proposed. The main feature of this encryption scheme is that the encrypted image is real and has the same size as the original one, being this encrypted image much more convenient for either its storage or its transmission on digital communication networks. Using the Jigsaw transform the security of the encrypted image is increased and the random phase masks used in many images cryptosystems based on Fractional Fourier Transform (FrFT) are eliminated. Finally, for the new proposed encryption method, a fingerprint encryption digital algorithm was developed. There are twelve keys used in the cryptographic algorithm implemented, which are constituted by the six DFrFTs fractional orders and the six random permutations used in Jigsaw transform; all these keys are necessary for a correct decryption, obtaining a high level security in protecting fingerprints for a particular application.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116704271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queueing systems with general renovation","authors":"I. Zaryadov","doi":"10.1109/ICUMT.2009.5345382","DOIUrl":"https://doi.org/10.1109/ICUMT.2009.5345382","url":null,"abstract":"Multi-server queueing systems with complete and general renovation are revised. Such models are often encountered in computer science applications. Methods of analysis for the queues with general(recurrent) input flow and exponential service time with different combinations of service and general renovation disciplines are discussed. Explicit solutions (the steady-state probabilitiy distribution , loss and service probabilities for arriving customers, waiting time for lost and serviced customers) are proposed.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124714367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aspasia Koukouvela, Christos Bouras, V. Kokkinos, A. Gkamas, P. Pouyioutas
{"title":"A Game Theoretic Approach for Efficient Resource Allocation in 5G Networks","authors":"Aspasia Koukouvela, Christos Bouras, V. Kokkinos, A. Gkamas, P. Pouyioutas","doi":"10.1109/ICUMT57764.2022.9943431","DOIUrl":"https://doi.org/10.1109/ICUMT57764.2022.9943431","url":null,"abstract":"Heterogeneous Networks (HetNets), which enable rapid expansion in mobile traffic, have been hailed as a critical technology for 5G communications. HetNets could increase the network's capacity and enable it to support additional users. However, interference between different cells makes Quality of Service (QoS) more challenging, and thus innovative protocols, and emerging trends should be incorporated to provide Resource Allocation efficiency (RA). Concepts provided from Game Theory (GT) have been widely applied to a variety of problems where the actions of one may influence or even conflict with those of others. As a result, game formulations are utilized, and the idea of equilibrium is applied to find a stable solution for all participants. In this paper, we compare two algorithms used for RA, the first being a classical RA algorithm and the second being a game theoretic one. The game implemented is called “Tragedy of the Commons” and is applied in a non-cooperative network.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical concerns of implementing machine learning algorithms for W-LAN location fingerprinting","authors":"Jörg Schäfer","doi":"10.1109/ICUMT.2014.7002120","DOIUrl":"https://doi.org/10.1109/ICUMT.2014.7002120","url":null,"abstract":"In the past, fingerprinting algorithms have been suggested as a practical and cost-effective means for deploying localisation services. Previous research, however, often assumes an (idealised) laboratory environment rather than a realistic set-up. In our work we analyse challenges occurring from a university environment which is characterised by hundreds of access points deployed and by heterogeneous mobile handsets of unknown technical specifications and quality. Our main emphasis lies on classification results for room detection. We analyse the problems caused by the huge number of access points available and by the heterogenous handsets. We show that standard techniques well-known in machine learning such as feature selection and dimensionality reduction do work. We also provide evidence that pre-processing techniques suggested previously in a laboratory set-up do not improve accuracy.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127603088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online adaptive compensation scheme for inverter nonlinearity in PMSM drive","authors":"Ludek Buchta, Lukáš Otava","doi":"10.1109/ICUMT.2015.7382422","DOIUrl":"https://doi.org/10.1109/ICUMT.2015.7382422","url":null,"abstract":"In this paper, a simple parameter-independent adaptive method to compensate dead-time effects and nonlinearity of a inverter is presented. The proposed approach is based on the monitoring of harmonic distortion in the d-axis current. Consequently, the criterion is calculated and minimized. The output of the proposed adaptive method is one slowly time-varying voltage, which is used to compensate the output voltage distortion. This approach is extended by estimator of persistent voltage disturbance based on the model of the permanent-magnet synchronous motor (PMSM). The effectiveness of the proposed approach is verified through the simulation experiments.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. I. Sharikov, A. Krasov, Artem Gelf, Ernest Birikh
{"title":"A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to Decompilation","authors":"P. I. Sharikov, A. Krasov, Artem Gelf, Ernest Birikh","doi":"10.1109/ICUMT54235.2021.9631736","DOIUrl":"https://doi.org/10.1109/ICUMT54235.2021.9631736","url":null,"abstract":"The relevance of the problem under study is due to the rapid development of the java programming language, a large number of commercial applications written in this programming language. The purpose of the article is to develop a methodology that allows you to determine the java-module of the information system, which does not contain a hidden digital watermark. It is necessary that the digital watermark is not damaged during the decompilation of the entire system in order to replace the java module, and that the class files and the entire information system function unchanged. Thus, at first, a digital watermark is hidden in all java-modules of the information system. Next, we check the resistance of the digital watermark to decompilation attacks with block substitution. The materials of the article can be useful in the implementation of hidden embedding of a digital watermark in the class files of a large java module.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aircraft evasive maneuver trajectory optimization based on QPSO","authors":"Xiaoping Wang, Qin-ying Lin, Xin-min Dong","doi":"10.1109/ICUMT.2010.5676603","DOIUrl":"https://doi.org/10.1109/ICUMT.2010.5676603","url":null,"abstract":"This paper introduces a parameterization method for obtaining closed-loop suboptimal solutions to the aircraft evasive maneuver problem, which is transformed into a nonlinear programming problem using Quantum-behaved Particle Swarm Optimization (QPSO) algorithm based on rolling optimization concept. Considering the aircraft sensitivity constraints, angle of attack and bank angle accelerations are chosen as the decision variables, which guarantee feasibility of the aircraft evasive maneuver trajectory with reduced inequality constraints. Simulation shows that the method presented is of high effectiveness.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Queueing Model of Hysteretic Congestion Control for Cloud Wireless Sensor Networks","authors":"A. Bashir, Egor Machnev, E. Mokrov","doi":"10.1109/ICUMT54235.2021.9631576","DOIUrl":"https://doi.org/10.1109/ICUMT54235.2021.9631576","url":null,"abstract":"This paper considers a Hysteretic congestion control model to mitigate congestion problems on WSN gateway. We model the system as a queueing system with two thresholds working under three modes: normal mode, reduced load mode and deny mode. We consider average number of requests in the system and blocking probability as the performance metrics and compare the acquired results against the results for IRED algorithm.","PeriodicalId":355496,"journal":{"name":"International Conference on Ultra Modern Telecommunications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}