2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)最新文献

筛选
英文 中文
Cooperative channels allocation in unlicensed spectrum for D2D assisted 5G cellular network D2D辅助5G蜂窝网络无牌频谱协同信道分配
T. Maksymyuk, Mykola Brych, M. Klymash, Minho Jo
{"title":"Cooperative channels allocation in unlicensed spectrum for D2D assisted 5G cellular network","authors":"T. Maksymyuk, Mykola Brych, M. Klymash, Minho Jo","doi":"10.1109/AIACT.2017.8020098","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020098","url":null,"abstract":"LTE-Unlicensed (LTE-U), has shown a great potential to boost the capacity of cellular networks. However, in most countries, implementation of LTE-U requires additional listen before talk (LBT) techniques to avoid interference between LTE-U and legacy Wi-Fi networks. Similar to conventional 802.11 protocol, LTE-U/LBT protocols perform quite well for the small number of users, whereas for the high number of users the bandwidth utilization decreases that has a negative impact on the spectral and energy efficiency. In this work, we develop a new approach for cooperative LTE-U/LBT for the case of D2D assisted cellular networks. The main idea is to reduce the number of total LBT attempts for each user by their cooperation within the D2D cluster. Each cluster is formed by two or more devices in the vicinity of each other, which sense the carrier occupancy alternately and share the obtained information with other cluster members. Thus, the number of sensing attempts is decreased proportionally to the number of users in a single cluster. To further improve the bandwidth utilization, cluster members configure the size of contention window to minimize the idle time between their access to the unlicensed channel. Simulation results show that proposed approach improves the energy efficiency and increases the overall capacity of LTE-U cellular network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
The synthesis methodology of scalable telecommunication service platforms 可扩展电信业务平台的综合方法
Zenoviy Kharkhalis, I. Demydov
{"title":"The synthesis methodology of scalable telecommunication service platforms","authors":"Zenoviy Kharkhalis, I. Demydov","doi":"10.1109/AIACT.2017.8020124","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020124","url":null,"abstract":"This paper presents the components of synthesis methodology for national scale telecommunication service platforms. In general, the methodology implies considering the telecommunication service platform as the layered infrastructural contraption, consisting of IaaS, PaaS and SaaS layers of servicing models' implementation, with the necessary modules and actions required to achieve optimal resource distribution. The modelling, which proves the efficiency of the proposed methodology is presented at the end.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulation of routing process based on fuzzy logic: The use of fuzzy sets in routing opens up new possibilities of management based on simple heuristic rules and adaptation to extreme and non-stationary traffic 基于模糊逻辑的路由过程仿真:模糊集在路由中的应用为基于简单启发式规则的管理和适应极端和非平稳流量开辟了新的可能性
I. Lesovoy, G. Pylypenko
{"title":"Simulation of routing process based on fuzzy logic: The use of fuzzy sets in routing opens up new possibilities of management based on simple heuristic rules and adaptation to extreme and non-stationary traffic","authors":"I. Lesovoy, G. Pylypenko","doi":"10.1109/AIACT.2017.8020120","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020120","url":null,"abstract":"It is proposed to modify the RIP protocol by increasing the number of parameters to calculate metrics such as allowance for the load factor, speed and acceleration load factor change the output buffer. The present paper is devoted to fuzzy controllers, which generate control action on the base of fuzzy logic. The details of the routing process modeling according to the loading of output buffer storage are discussed. The obtained dependence of the lost packets fraction on the input intensity is given. It is shown that accounting for buffer loading increases the efficiency of their use and can significantly affect the function of the telecommunications network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124626941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Calculation of routing value in MPLS network according to traffic fractal properties 基于流量分形特性的MPLS网络路由值计算
T. Radivilova, Lyudmyla Kirichenko, Oleksandra Yeremenko
{"title":"Calculation of routing value in MPLS network according to traffic fractal properties","authors":"T. Radivilova, Lyudmyla Kirichenko, Oleksandra Yeremenko","doi":"10.1109/AIACT.2017.8020112","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020112","url":null,"abstract":"Method for calculating routing cost of MPLS network is presented in the work. This method allows to minimize routing cost, taking into account traffic fractal properties, choice of traffic transmission path and quality of service requirements. The method uses values of the Hurst parameter and value of normalized spread of traffic values, which makes it possible to apply it to self-similar and multifractal data streams.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134075824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The economy model of the multi-homing based dynamic spectrum access networks 基于多归巢的动态频谱接入网经济模型
Eugen Šapak, Marcel Vološn, J. Gazda, V. Gazda
{"title":"The economy model of the multi-homing based dynamic spectrum access networks","authors":"Eugen Šapak, Marcel Vološn, J. Gazda, V. Gazda","doi":"10.1109/AIACT.2017.8020093","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020093","url":null,"abstract":"The multi-homing technique in the dynamic spectrum access networks presents the key mechanism to improve the overall spectrum utilization and social surplus of the end-users willing to communicate. In general, multi-homing allows the enduser to switch dynamically among the operators and together with other bunch of protocols are being developed in the IETF. They aim for better utilizing the network resources and thus improving the quality of service and experience (QoS/QoE) of the end-users. In our paper we present the agent-based application of the multi-homing technique, where the focus is paid on the investigation of the economy impacts on the overall network functioning of such a type. We show that the price-based demand evolution and price competition effects the network functioning only in the certain range of the network utilization. In this specific utilization range, the price competition, demand sensitivity and specific end-user's location work well, conforming with the known economic rules.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ergonomie reserves for improving reliability of data processing in distributed banking systems 人机工效学为提高分布式银行系统数据处理的可靠性做好了准备
E. Lavrov, A. Tolbatov, N. Pasko, V. Tolbatov
{"title":"Ergonomie reserves for improving reliability of data processing in distributed banking systems","authors":"E. Lavrov, A. Tolbatov, N. Pasko, V. Tolbatov","doi":"10.1109/AIACT.2017.8020070","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020070","url":null,"abstract":"The features of approaches to improve reliability of activity of operators of information systems of banks investigated. The principles and methods that should be used in the development and implementation of ergonomic provision of quality of banking information technology proposed.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Finding some QoS characteristics of self-similar traffic serviced by a mobile network 寻找移动网络服务的自相似流量的QoS特征
Strelkovskaya Irina, Solovskaya Irina, M. Anastasiya
{"title":"Finding some QoS characteristics of self-similar traffic serviced by a mobile network","authors":"Strelkovskaya Irina, Solovskaya Irina, M. Anastasiya","doi":"10.1109/AIACT.2017.8020086","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020086","url":null,"abstract":"The work considers a G/M/1 queuing system used to simulate the process of self-similar traffic service by a e-NodeB of a mobile network. Some quality-of-service characteristics for self-similar traffic are found, including: the value of average waiting time for packets in the QS and the probability of finding n packets within the QS. The obtained results will allow to consider actual traffic values serviced by a e-NodeB base stations in order to distribute them in an optimal way over a territory at the stage of frequency planning and further operation of the 4G/LTE networks.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficiency analysis of signal-code sequences selection algorithms on IEEE 802.11 equipment IEEE 802.11设备上信码序列选择算法的效率分析
L. Uryvsky, A. Moshynska, S. Osypchuk
{"title":"Efficiency analysis of signal-code sequences selection algorithms on IEEE 802.11 equipment","authors":"L. Uryvsky, A. Moshynska, S. Osypchuk","doi":"10.1109/AIACT.2017.8020090","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020090","url":null,"abstract":"The existing algorithms for the selection and switching of signal-code sequences (SCS) in IEEE 802.11 wireless equipment are analyzed. Indicators and criteria for assessing the efficiency of existing SCSs switching algorithms are reviewed. Suggested algorithms for switching SCS are proposed taking into account advantages and disadvantages of such algorithms.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison plagiarism search algorithms implementations 比较抄袭搜索算法实现
Serhii Vashchilin, H. Kushnir
{"title":"Comparison plagiarism search algorithms implementations","authors":"Serhii Vashchilin, H. Kushnir","doi":"10.1109/AIACT.2017.8020074","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020074","url":null,"abstract":"This article offers you to familiarize with metrics which are reveal disadvantages and advantages of plagiarism search algorithms. Reviewed algorithms have the most practical value, because of their use in commercial sphere. Lack of specialized sources, which reveal all sides of similar algorithms creates problems for people, who wants to solve plagiarism problem, but who has not experience and knowledges in this sphere, to use one of reviewed algorithms. Article conducts a thorough analysis metrics time depending on various factors, answering the question of efficiency of use of an algorithm for different situations, experimentally investigating the required parameters for each algorithm for its correct working. In addition, the article describes the difference of using parameters for realization of an algorithms. All reviewed metrics held with custom author's implementation of algorithms because their essence remains the same at different implementation.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel approach for improving the modular exponentiation performance 一种改进模求幂性能的新方法
M. Abbasi, A. Rezai, Asghar Karimi
{"title":"A novel approach for improving the modular exponentiation performance","authors":"M. Abbasi, A. Rezai, Asghar Karimi","doi":"10.1109/AIACT.2017.8020062","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020062","url":null,"abstract":"Modular exponentiation (ME) that computes by repeating modular multiplications (M2), is main operation in public-key cryptosystems. In recent years, many researchers studied on improving M2 and ME methods. This paper presents an improved and efficient modular exponentiation method. In the developed method, the compact SD and bit forwarding techniques and k-partition parallel structure are used to accelerate the modular exponentiation algorithm. The complexity analysis results demonstrate that the proposed method provides an improvements in terms of the number of required clock cycles in comparison with other ME methods.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信