{"title":"Cooperative channels allocation in unlicensed spectrum for D2D assisted 5G cellular network","authors":"T. Maksymyuk, Mykola Brych, M. Klymash, Minho Jo","doi":"10.1109/AIACT.2017.8020098","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020098","url":null,"abstract":"LTE-Unlicensed (LTE-U), has shown a great potential to boost the capacity of cellular networks. However, in most countries, implementation of LTE-U requires additional listen before talk (LBT) techniques to avoid interference between LTE-U and legacy Wi-Fi networks. Similar to conventional 802.11 protocol, LTE-U/LBT protocols perform quite well for the small number of users, whereas for the high number of users the bandwidth utilization decreases that has a negative impact on the spectral and energy efficiency. In this work, we develop a new approach for cooperative LTE-U/LBT for the case of D2D assisted cellular networks. The main idea is to reduce the number of total LBT attempts for each user by their cooperation within the D2D cluster. Each cluster is formed by two or more devices in the vicinity of each other, which sense the carrier occupancy alternately and share the obtained information with other cluster members. Thus, the number of sensing attempts is decreased proportionally to the number of users in a single cluster. To further improve the bandwidth utilization, cluster members configure the size of contention window to minimize the idle time between their access to the unlicensed channel. Simulation results show that proposed approach improves the energy efficiency and increases the overall capacity of LTE-U cellular network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114819100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The synthesis methodology of scalable telecommunication service platforms","authors":"Zenoviy Kharkhalis, I. Demydov","doi":"10.1109/AIACT.2017.8020124","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020124","url":null,"abstract":"This paper presents the components of synthesis methodology for national scale telecommunication service platforms. In general, the methodology implies considering the telecommunication service platform as the layered infrastructural contraption, consisting of IaaS, PaaS and SaaS layers of servicing models' implementation, with the necessary modules and actions required to achieve optimal resource distribution. The modelling, which proves the efficiency of the proposed methodology is presented at the end.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124608497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of routing process based on fuzzy logic: The use of fuzzy sets in routing opens up new possibilities of management based on simple heuristic rules and adaptation to extreme and non-stationary traffic","authors":"I. Lesovoy, G. Pylypenko","doi":"10.1109/AIACT.2017.8020120","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020120","url":null,"abstract":"It is proposed to modify the RIP protocol by increasing the number of parameters to calculate metrics such as allowance for the load factor, speed and acceleration load factor change the output buffer. The present paper is devoted to fuzzy controllers, which generate control action on the base of fuzzy logic. The details of the routing process modeling according to the loading of output buffer storage are discussed. The obtained dependence of the lost packets fraction on the input intensity is given. It is shown that accounting for buffer loading increases the efficiency of their use and can significantly affect the function of the telecommunications network.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124626941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Radivilova, Lyudmyla Kirichenko, Oleksandra Yeremenko
{"title":"Calculation of routing value in MPLS network according to traffic fractal properties","authors":"T. Radivilova, Lyudmyla Kirichenko, Oleksandra Yeremenko","doi":"10.1109/AIACT.2017.8020112","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020112","url":null,"abstract":"Method for calculating routing cost of MPLS network is presented in the work. This method allows to minimize routing cost, taking into account traffic fractal properties, choice of traffic transmission path and quality of service requirements. The method uses values of the Hurst parameter and value of normalized spread of traffic values, which makes it possible to apply it to self-similar and multifractal data streams.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134075824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The economy model of the multi-homing based dynamic spectrum access networks","authors":"Eugen Šapak, Marcel Vološn, J. Gazda, V. Gazda","doi":"10.1109/AIACT.2017.8020093","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020093","url":null,"abstract":"The multi-homing technique in the dynamic spectrum access networks presents the key mechanism to improve the overall spectrum utilization and social surplus of the end-users willing to communicate. In general, multi-homing allows the enduser to switch dynamically among the operators and together with other bunch of protocols are being developed in the IETF. They aim for better utilizing the network resources and thus improving the quality of service and experience (QoS/QoE) of the end-users. In our paper we present the agent-based application of the multi-homing technique, where the focus is paid on the investigation of the economy impacts on the overall network functioning of such a type. We show that the price-based demand evolution and price competition effects the network functioning only in the certain range of the network utilization. In this specific utilization range, the price competition, demand sensitivity and specific end-user's location work well, conforming with the known economic rules.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114934599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ergonomie reserves for improving reliability of data processing in distributed banking systems","authors":"E. Lavrov, A. Tolbatov, N. Pasko, V. Tolbatov","doi":"10.1109/AIACT.2017.8020070","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020070","url":null,"abstract":"The features of approaches to improve reliability of activity of operators of information systems of banks investigated. The principles and methods that should be used in the development and implementation of ergonomic provision of quality of banking information technology proposed.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122150173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Strelkovskaya Irina, Solovskaya Irina, M. Anastasiya
{"title":"Finding some QoS characteristics of self-similar traffic serviced by a mobile network","authors":"Strelkovskaya Irina, Solovskaya Irina, M. Anastasiya","doi":"10.1109/AIACT.2017.8020086","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020086","url":null,"abstract":"The work considers a G/M/1 queuing system used to simulate the process of self-similar traffic service by a e-NodeB of a mobile network. Some quality-of-service characteristics for self-similar traffic are found, including: the value of average waiting time for packets in the QS and the probability of finding n packets within the QS. The obtained results will allow to consider actual traffic values serviced by a e-NodeB base stations in order to distribute them in an optimal way over a territory at the stage of frequency planning and further operation of the 4G/LTE networks.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124379118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficiency analysis of signal-code sequences selection algorithms on IEEE 802.11 equipment","authors":"L. Uryvsky, A. Moshynska, S. Osypchuk","doi":"10.1109/AIACT.2017.8020090","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020090","url":null,"abstract":"The existing algorithms for the selection and switching of signal-code sequences (SCS) in IEEE 802.11 wireless equipment are analyzed. Indicators and criteria for assessing the efficiency of existing SCSs switching algorithms are reviewed. Suggested algorithms for switching SCS are proposed taking into account advantages and disadvantages of such algorithms.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison plagiarism search algorithms implementations","authors":"Serhii Vashchilin, H. Kushnir","doi":"10.1109/AIACT.2017.8020074","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020074","url":null,"abstract":"This article offers you to familiarize with metrics which are reveal disadvantages and advantages of plagiarism search algorithms. Reviewed algorithms have the most practical value, because of their use in commercial sphere. Lack of specialized sources, which reveal all sides of similar algorithms creates problems for people, who wants to solve plagiarism problem, but who has not experience and knowledges in this sphere, to use one of reviewed algorithms. Article conducts a thorough analysis metrics time depending on various factors, answering the question of efficiency of use of an algorithm for different situations, experimentally investigating the required parameters for each algorithm for its correct working. In addition, the article describes the difference of using parameters for realization of an algorithms. All reviewed metrics held with custom author's implementation of algorithms because their essence remains the same at different implementation.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach for improving the modular exponentiation performance","authors":"M. Abbasi, A. Rezai, Asghar Karimi","doi":"10.1109/AIACT.2017.8020062","DOIUrl":"https://doi.org/10.1109/AIACT.2017.8020062","url":null,"abstract":"Modular exponentiation (ME) that computes by repeating modular multiplications (M2), is main operation in public-key cryptosystems. In recent years, many researchers studied on improving M2 and ME methods. This paper presents an improved and efficient modular exponentiation method. In the developed method, the compact SD and bit forwarding techniques and k-partition parallel structure are used to accelerate the modular exponentiation algorithm. The complexity analysis results demonstrate that the proposed method provides an improvements in terms of the number of required clock cycles in comparison with other ME methods.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}