2020 13th International Conference on Communications (COMM)最新文献

筛选
英文 中文
Evaluation of UWB Transmissions in Highly Reflective Environments 高反射环境下超宽带传输的评估
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142043
A. Pastrav, Raluca Simedroni, T. Palade, P. Dolea, D. Popescu, E. Puschita
{"title":"Evaluation of UWB Transmissions in Highly Reflective Environments","authors":"A. Pastrav, Raluca Simedroni, T. Palade, P. Dolea, D. Popescu, E. Puschita","doi":"10.1109/COMM48946.2020.9142043","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142043","url":null,"abstract":"UWB transmissions based on the IEEE 802.15.4 standard have the advantage of robustness and high immunity to multipath fading. As such, the scientific community considers UWB suitable for communications in highly reflective environments. This paper aims to evaluate the feasibility and performance of a UWB-based wireless communications link inside a satellite mockup. Two types of applications are envisaged: wireless positioning (implemented with the Decawave MDEK1001 development kit and evaluated in terms of positioning error) and data transfer (implemented with CDS VN360 UWB radio modules and evaluated in terms of packet transmission success rate). The test results highlight the impact of the environment on the performance of the two types of applications. While the UWB technology is able to overcome the shortcomings of multiple reflections and provide a reliable data transfer in such environments, the positioning accuracy is degraded if the algorithm is based on time of flight.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134132257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cooperative Spectrum Sensing for Three Secondary Users with Sequential Relaying for Cognitive Radio 基于认知无线电顺序中继的三次用户协同频谱感知
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141968
O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, Alexandru Martian, D. Popescu
{"title":"Cooperative Spectrum Sensing for Three Secondary Users with Sequential Relaying for Cognitive Radio","authors":"O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, Alexandru Martian, D. Popescu","doi":"10.1109/COMM48946.2020.9141968","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141968","url":null,"abstract":"Cooperative spectrum sensing for Cognitive Radio (CR) networks involves more opportunistic Secondary Users (SUs) that help each other to detect the presence of the signal transmitted by a licensed Primary User (PU). Among cooperative spectrum sensing methods, the Amplify and Forward (AF) technique assumes that SUs relay the received signals without additional processing. In the present paper, inspired by previous works, we introduce a novel cooperative AF scheme with three SUs, where two SUs (denoted as S2 and S3) perform a sequential relaying for the signal transmitted by the third SU (S1) using a Time Division Multiple Access (TDMA) transmission protocol. This sequential relaying requires three consecutive time slots. In the first slot, S1 transmits a test signal; in the second slot, S2 relays the signal received during the first slot; in the third slot, S3 relays the signal received during the second slot. Considering the conventional Energy Detection (ED), the detection probability is estimated analytically and by simulation. Even the novel scheme requires an additional time slot, we demonstrate that the sequential relaying AF scheme outperforms the non-cooperative scheme for almost any topological position of the relaying SUs.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134135109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intelligent System for Precision Agriculture 精准农业智能系统
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141981
Madalina Mioara Anghelof, G. Suciu, R. Craciunescu, C. Marghescu
{"title":"Intelligent System for Precision Agriculture","authors":"Madalina Mioara Anghelof, G. Suciu, R. Craciunescu, C. Marghescu","doi":"10.1109/COMM48946.2020.9141981","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141981","url":null,"abstract":"Precision agriculture is a type of innovative agriculture, based on new technologies, which aims to streamline the agricultural process. The aim of this paper consists in reducing the consumption of resources and reaching the maximum potential of the harvest, providing a smart greenhouse which automatically improves the quality of the culture. Environmental parameters will be measured through several sensors and depending on the data set, the system will decide and control the appropriate climate conditions for each crop. The data will be transmitted through the Message Queuing Telemetry Transport (MQTT) protocol to an android application which allows the user to view and set the environmental conditions.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Assessment of Burned Area Mapping Methods for Smoke Covered Sentinel-2 Data 烟雾覆盖Sentinel-2数据烧伤面积制图方法评价
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141999
Alexandru-Cosmin Grivei, C. Vaduva, M. Datcu
{"title":"Assessment of Burned Area Mapping Methods for Smoke Covered Sentinel-2 Data","authors":"Alexandru-Cosmin Grivei, C. Vaduva, M. Datcu","doi":"10.1109/COMM48946.2020.9141999","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141999","url":null,"abstract":"Wildfires become more frequent in the context of global warming and severe drought in several parts of the globe. Earth observation data can be used to provide information in such cases, but sometimes, when using optical satellite imagery, the evaluation of the effects produced by ongoing large scale forest fires, can be impeded by smoke. It can reduce the accuracy of the information required by disaster management authorities when allocating resources. To improve both the usability of optical remote sensing data and the quality of the obtained information we compare multiple feature extraction, classification, and visual enhancement methods and algorithms for land cover mapping of smoke covered Sentinel-2 data. The demonstration is performed for the 2019 forest fires in Australia.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory 基于博弈论的不确定性决策问题网络安全模型
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141991
P. Cotae, Myong Kang, Alexander Velazquez
{"title":"A Cybersecurity Model for Decision-Making Problems Under Uncertainty Using Game Theory","authors":"P. Cotae, Myong Kang, Alexander Velazquez","doi":"10.1109/COMM48946.2020.9141991","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141991","url":null,"abstract":"We propose a new cybersecurity decision-making model based on game-theory and decision-making process. The proposed model allows the cyber defender to make optimal decisions by considering perceived damage, cost of potential defensive actions, and benefit to mission. We provide detailed examples and numerical results supporting our model to show how game theory can help the decision-making process for cybersecurity by focusing on situations of conflict between an attacker and a defender.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulating RPL Attacks in 6lowpan for Detection Purposes 模拟6lowpan中的RPL攻击以进行检测
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142026
M. Preda, V. Patriciu
{"title":"Simulating RPL Attacks in 6lowpan for Detection Purposes","authors":"M. Preda, V. Patriciu","doi":"10.1109/COMM48946.2020.9142026","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142026","url":null,"abstract":"The Internet of Things (IoT) integrates the Internet and electronic devices belonging to different domains, such as smart home automation, industrial processes, military applications, health, and environmental monitoring. Usually, IoT devices have limited resources and Low Power and Lossy Networks (LLNs) are being used to interconnect such devices. Routing Protocol for Low-Power and Lossy Networks (RPL) is one of the preferred routing protocols for this type of network, since it was specially developed for LLNs, also known as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). In this paper the most well-known routing attacks against 6LoWPAN networks were studied and implemented through simulation, conducting a behavioral analysis of network components (resources, topology, and data traffic) under attack condition. In order to achieve a better understanding on how attacks in 6LoWPAN work, we first conducted a study on 6LoWPAN networks and RPL protocol functioning. Furthermore, we also studied a series of well-known routing attacks against this type of Wireless Sensor Networks and these attacks were then simulated using Cooja simulator provided by Contiki operating system. The results obtained after the simulations are discussed along with other previous researches. This analysis may be of real interest when it comes to identify indicators of compromise for each type of attack and appropriate countermeasures for prevention and detection of these attacks.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123291232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Characterization of Atheroma Plaques Echogenicity and Texture for Computer- Aided Diagnosis in Cardiovascular Diseases 心血管疾病计算机辅助诊断中动脉粥样硬化斑块的回声特征和质地特征
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142032
Adriana Molder, C. Molder, I. Vizitiu, S. Dumitrescu
{"title":"Characterization of Atheroma Plaques Echogenicity and Texture for Computer- Aided Diagnosis in Cardiovascular Diseases","authors":"Adriana Molder, C. Molder, I. Vizitiu, S. Dumitrescu","doi":"10.1109/COMM48946.2020.9142032","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142032","url":null,"abstract":"Developments of image processing techniques such as classical feature extraction, neural networks, artificial intelligence and deep learning have made possible enhancement, analysis, recognition and classification of medical imaging. The presence of atheroma plaques in the carotid artery is associated with an increased risk of all forms of cardiovascular disease and this risk increases with plaque growth. Moreover, the morphological structure of the plaque is closely related to the overall cardiovascular risk. Regardless of the type of medical imaging computer-aided diagnosis (CAD) has become one of the major research subjects in medical imaging and diagnostic. The purpose of this article is to obtain a fully automatic procedure for atheroma plaques characterization in order to prevent stroke. Our approach is based on two morphological characteristics of atheroma plaques: the measurement of echogenicity based on percentage of white and the quantification of homogeneity based on five Haralick texture features.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122686177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation for an E-Business Platform 电子商务平台的绩效评估
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141962
E. Pop, Daniela Gîfu
{"title":"Performance Evaluation for an E-Business Platform","authors":"E. Pop, Daniela Gîfu","doi":"10.1109/COMM48946.2020.9141962","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141962","url":null,"abstract":"E-business combines the Internet and network environment with the economic operations, reaching to the core of the business processes, strengthen the enterprises informatization and digitization level. Often e-business integrates different services which communicate with each other. Frameworks and collections of services can be developed in efficient manner using Service Oriented Architecture (SOA). Web services based on Soap protocol and Rest architectural style are key technologies, used to realize e-business applications frameworks. In this paper is presented an e-business platform example, based on SOAP and REST Web services, which can be accessed by mobile users through Android OS Smartphones, while the data traffic amount and cost are optimized. The digital content source is represented by the Bucharest Stock Exchange (BSE), but it also can be retrieved from on-line vendors, e-commerce, e-payment agents etc. A performance evaluation for the e-business SOAP and REST Web services, provided on 4G LTE and IEEE 802.11n WLAN channels, is presented in the paper, in a QoS approach, referring to the response time and throughput. The content and informational tools of the platform can be extended and configured to provide and comply with other types of e-business services as: e-banking, e-commerce, e-payment agents etc, according to different application patterns.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble of Deep Convolutional Neural Networks for Drunkenness Detection Using Thermal Infrared Facial Imagery 基于热红外人脸图像的深度卷积神经网络醉酒检测
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142020
V. Neagoe, Octavian Catrina, Paul Diaconescu
{"title":"An Ensemble of Deep Convolutional Neural Networks for Drunkenness Detection Using Thermal Infrared Facial Imagery","authors":"V. Neagoe, Octavian Catrina, Paul Diaconescu","doi":"10.1109/COMM48946.2020.9142020","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142020","url":null,"abstract":"This paper proposes an original method for subject independent drunkenness detection using an ensemble of Deep Convolutional Neural Networks (DCNNs) for processing of thermal infrared facial imagery characterizing the subjects to be tested. The proposed neural system consists of an ensemble of two DCNNs modules for thermal infrared facial image processing; the first module is composed by 12 layers and the second one has 10 layers. The two DCNNs have been trained separately, using different architectures and different sets of parameters. The final decision is influenced by the confidence degrees of two CNN component modules. The proposed method is evaluated using the dataset of 400 thermal infrared facial images belonging to 10 subjects. For each subject the dataset contains 20 thermal images corresponding to sober condition and other 20 images for inebriation condition obtained 30 minutes after the subject has drunk 100 ml amount of whisky. The experiments of the proposed DCNN couple for subject independent drunkenness detection lead to the overall correct detection score of 95.75%. This confirms the effectiveness of the proposed approach.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121449454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Sensors Network Framework for Developing Boards using Contiki Operating System 基于Contiki操作系统的开发板无线传感器网络框架
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142011
A. Sava, S. Zoican
{"title":"Wireless Sensors Network Framework for Developing Boards using Contiki Operating System","authors":"A. Sava, S. Zoican","doi":"10.1109/COMM48946.2020.9142011","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142011","url":null,"abstract":"The paper presents a framework for integrating the Analog Devices wireless sensors network (ADI-WSN) developing and evaluation boards in the WSN operating system Contiki. The proprietary software used by ADI-WSN is replaced by new proposed software with the following advantages: multitasking environment to create a flexible and more efficient applications by using the operating system primitives, active loops elimination for sensors, battery life improvements, application portability and easier ADI-WSN node connectivity with other type nodes already integrated in Contiki operating system. The obtained results show the full functionality of ADI-WSN node in Contiki environment and the extending the battery life with a factor of ten.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122212793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信