2014 X International Symposium on Telecommunications (BIHTEL)最新文献

筛选
英文 中文
Security analysis of user mobility in triple-play systems 三播系统中用户移动性的安全性分析
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987653
S. Mrdović, Darijo Raca, K. Turbic
{"title":"Security analysis of user mobility in triple-play systems","authors":"S. Mrdović, Darijo Raca, K. Turbic","doi":"10.1109/BIHTEL.2014.6987653","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987653","url":null,"abstract":"Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protocols for session control, SIP. and media transfer, RTP, have their secured versions, SIPS and RTSP. That solution would require multiple protocols and keys and would be a burden on users and system administrators. This paper proposes an architecture that uses IMS to provide services and VPN to secure them. IMS provides convenience of user mobility. VPN provides authentication, confidentiality and integrity. Additional security provided by VPN does not translate to additional work for users, It is completely transparent for them. Proposed design is implemented and tested. IMS with different services was available, through VPN, to mobile users connected to the Internet with different devices and connections. The testing confirmed security and usability for mobile users.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns 基于元胞自动机和局部二值模式的视频帧复制-移动伪造检测
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987651
D. Tralic, S. Grgic, B. Zovko-Cihlar
{"title":"Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns","authors":"D. Tralic, S. Grgic, B. Zovko-Cihlar","doi":"10.1109/BIHTEL.2014.6987651","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987651","url":null,"abstract":"Copy-move forgery (CMF) is a common image forgery method that implies copying and moving a part of image to a new location in the same image. In video sequences, CMF can be accomplished by copying a set of frames and pasting them to a new location in the same sequence. The result of this process is usually changing of video content. To identify video CMF, it is necessary to develop a robust descriptor for identification of duplicated video frames. This paper presents a novel method where Cellular Automata (CA) and Local Binary Patterns (LBPs) are used as texture descriptors. The main idea is to divide every frame into overlapping blocks and use CA to learn a set of rules for every block in a frame. Those rules appropriately describe the intensity changes in every block so their histogram can be used as a feature for detection of duplicated frames. Experimental testing showed a good performance of a proposed method for detection of video CMF in all tested cases.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Validating IPTV service quality under realistic triple play network conditions 验证实际三网融合网络条件下的IPTV服务质量
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987652
Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic
{"title":"Validating IPTV service quality under realistic triple play network conditions","authors":"Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic","doi":"10.1109/BIHTEL.2014.6987652","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987652","url":null,"abstract":"This paper discusses a concept of predicting interactions between measurable (technical) parameters of telecommunications network - QoS (Quality of Service) and QoE (Quality of Experience) of the video under realistic triple play network conditions using IPTV (Internet Protocol TV). Here is represented a simulation method using OPNET as simulation tool that includes a complete scenario of IPTV channels distribution in the hypothetical IP / MPLS network. Based on simulation results of the QoS parameters in the network and using of certain well-known regression analysis of QoS/QoE correlation model it is possible to evaluate the quality of the received video perceived by the user. It performs the mapping between quality assessment VQR (Video Quality Ratings), VQM (Video Quality Metric) and DMOS (Difference Mean Opinion Score) subjective rating scales. In that way it performs validation of IPTV service in terms of comparing the original video and the received video by the end user. The aim of this paper is to demonstrate the possibility of video quality validation under laboratory conditions using simulation method.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
XML-based fuzzy system specification 基于xml的模糊系统规范
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987637
D. Boskovic, Z. Avdagić
{"title":"XML-based fuzzy system specification","authors":"D. Boskovic, Z. Avdagić","doi":"10.1109/BIHTEL.2014.6987637","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987637","url":null,"abstract":"This paper presents a XML-based specification of the fuzzy system (FS) with objective to facilitate FS development by separation of the Fuzzy Inference System (FIS) implementation and a problem domain description. Generic FIS application is implemented in Java, and XML schema for domain knowledge specification is developed. Study case supporting the experimental evaluation of the proposed solution is software quality evaluation.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing maximum shared risk link group disjoint path algorithm using NVIDIA CUDA heterogeneous parallel programming platform 基于NVIDIA CUDA异构并行编程平台优化最大共享风险链路组不相交路径算法
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987645
V. Miletić, Tomislav Šubić, B. Mikac
{"title":"Optimizing maximum shared risk link group disjoint path algorithm using NVIDIA CUDA heterogeneous parallel programming platform","authors":"V. Miletić, Tomislav Šubić, B. Mikac","doi":"10.1109/BIHTEL.2014.6987645","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987645","url":null,"abstract":"Network availability is an essential feature of an optical telecommunication network. Should a failure of a network component occur, be it a link or a component inside a node, network control plane must be able to detect the failure and reroute the traffic using spare components until a repair is done. Shared risk link groups (SRLGs) are used to describe a situation where seemingly unrelated logical failures happen due to a single physical failure. For example, two or more links might share a bridge crossing; should a failure happen, all of them will be damaged. Routing algorithms were proposed to ensure working and spare paths of a connection in a network are SRLG-disjoint to avoid such common cause failures. However, complete SRLG-disjointness of working and spare path is not always possible due to limited number of links or limited capacity available in the network, so maximum SRLG-disjoint paths algorithm is taken instead. Maximum SRLG-disjoint path problem is in general NP-hard. In terms of solution quality greedy algorithms for maximum SRLG-disjoint path problem are as good as more complicated heuristics. To improve the performance of maximum SRLG-disjoint path greedy algorithm, it was implemented using NVIDIA CUDA heterogeneous parallel programming platform and executed on graphics processing unit. The implementation of maximum SRLG-disjoint path algorithm on GPU increases performance significantly compared to implementation utilizing only CPU, especially in simulations of large networks.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predicting Quality of Web Service using IKS hybrid model 基于IKS混合模型的Web服务质量预测
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987636
B. Trstenjak, D. Donko
{"title":"Predicting Quality of Web Service using IKS hybrid model","authors":"B. Trstenjak, D. Donko","doi":"10.1109/BIHTEL.2014.6987636","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987636","url":null,"abstract":"Internet and various services offered by it has become a daily routine. The Quality of Web Service (QWS) has become a significant factor in distinguishing the success of service providers. The main purpose of this paper is to analyze quality prediction using the IKS hybrid model with a new approach of data classification. We present the IKS hybrid model. The model combines selection of features, clustering and classification techniques. Three techniques are used (Information Gain (IG), K-means and Support Vector Machine (SVM)) over QWS dataset with collected 5,000 Web services. Our experiments and test results show that the proposed hybrid approach has achieved promising results in predicting the quality of web services and it represents a good basis for further development and research.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":" 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Teaching application development for RFID/ZigBee networks using open source hardware 基于开源硬件的RFID/ZigBee网络教学应用开发
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987641
D. Dobrilović, Ž. Stojanov, B. Odadzic
{"title":"Teaching application development for RFID/ZigBee networks using open source hardware","authors":"D. Dobrilović, Ž. Stojanov, B. Odadzic","doi":"10.1109/BIHTEL.2014.6987641","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987641","url":null,"abstract":"Concepts related to Wireless Sensor Networks (WSN), Machine-to-Machine (M2M) and the Internet of Things (IoT) have recently gained significant attention in university education. According to this, the need for low-cost, modular, easy-to-use and scalable platform used for building various network systems in order to provide an environment for developing and testing software applications for WSN, IoT and related technologies is very high. This paper presents an approach in creating platform based on open source hardware designed to provide an infrastructure for teaching development of software applications for WSN, in this case applications for RFID/ZigBee networks, to be used in Computing education and profession.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cascade SMC control of Ćuk converter for telecommunication systems power supply 电信系统电源Ćuk变换器的串级SMC控制
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987649
Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic
{"title":"Cascade SMC control of Ćuk converter for telecommunication systems power supply","authors":"Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic","doi":"10.1109/BIHTEL.2014.6987649","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987649","url":null,"abstract":"This paper gives one possible application of Ćuk converter for telecommunication equipment power supply. Ćuk converter is controlled with cascade control system, with two regualtion loops, outer loop is voltage PI control loop and inner loop is current SMC (Sliding Mode Control) controlled loop. The control system also has input inductor current limiter, which is necessary in cases of large input currents. Simulation results show good control in cases of input voltage test signals with high frequency ripple and slow changes.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Volterra kernels extraction from neural networks for amplifier behavioral modeling 基于神经网络的Volterra核提取放大器行为建模
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987646
Jelena Misic, V. Markovic, Z. Marinković
{"title":"Volterra kernels extraction from neural networks for amplifier behavioral modeling","authors":"Jelena Misic, V. Markovic, Z. Marinković","doi":"10.1109/BIHTEL.2014.6987646","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987646","url":null,"abstract":"In wireless communication systems the amplifier non-linear distortion problems are extremely challenging. The linearization techniques based on behavioral models of amplifiers, seem to be very promising, therefore developing a suitable non-linear model is of the crucial importance. A rigorous approach for non-linear modeling is using the of Volterra series, however the calculation of the Volterra coefficients is a complex and time-consuming task. In this paper, an easy and advanced approach for extraction of the Volterra kernels will be presented. The third order Volterra kernels are derived from the parameters of a feed-forward time delay neural network with a suitable activation function.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feedforward carrier estimation method for bpsk with large Doppler shift 大多普勒频移bpsk的前馈载波估计方法
2014 X International Symposium on Telecommunications (BIHTEL) Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987643
A. Semenova, A. Tikhomirov
{"title":"Feedforward carrier estimation method for bpsk with large Doppler shift","authors":"A. Semenova, A. Tikhomirov","doi":"10.1109/BIHTEL.2014.6987643","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987643","url":null,"abstract":"In the paper a new method based on feedforward carrier estimation circuit is described for BPSK carrier synchronization. Simulation of model based on proposed method shows comparable performance with square-law and Costas loop feedback circuits in small frequency shift conditions in AWGN channel, but operates in a frequency range up to 10% of symbol rate with slowly degrading BER comparing to maximum tracking range of 3% of symbol rate for feedback circuits. Due to its wide frequency band and implementation simplicity, proposed circuit is recommended for using in the communication BPSK systems with large Doppler shift.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信