Edson Ramiro Lucas Filho, Lambros Odysseos, Yang Lun, Fu Kebo, H. Herodotou
{"title":"DITIS: A Distributed Tiered Storage Simulator","authors":"Edson Ramiro Lucas Filho, Lambros Odysseos, Yang Lun, Fu Kebo, H. Herodotou","doi":"10.36244/icj.2022.4.3","DOIUrl":"https://doi.org/10.36244/icj.2022.4.3","url":null,"abstract":"This paper presents DITIS, a simulator for distributed and tiered file-based storage systems. In particular, DITIS can model a distributed storage system with up to three levels of storage tiers and up to three additional levels of caches. Each tier and cache can be configured with different number and type of storage media devices (e.g., HDD, SSD, NVRAM, DRAM), each with their own performance characteristics. The simulator utilizes the provided characteristics in fine-grained performance cost models (which are distinct for each device type) in order to compute the duration time of each I/O request processed on each tier. At the same time, DITIS simulates the overall flow of requests through the different layers and storage nodes of the system using numerous pluggable policies that control every aspect of execution, ranging from request routing and data redundancy to cache and tiering strategies. For performing the simulation, DITIS adapts an extended version of the Actor Model, during which key components of the system exchange asynchronous messages with each other, much like a real distributed multi-threaded system. The ability to simulate the execution of a workload in such an accurate and realistic way brings multiple benefits for its users, since DITIS can be used to better understand the behavior of the underlying file system as well as evaluate different storage setups and policies.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75827278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Challenges of Mutual Interference between Cable Television Networks and Mobile Fixed Communication Networks in the Digital Dividend Bands","authors":"Hussein Taha, Péter Vári, Szilvia Nagy","doi":"10.36244/icj.2022.3.8","DOIUrl":"https://doi.org/10.36244/icj.2022.3.8","url":null,"abstract":"Recently, the issue of monitoring and repairing leakage from cable television networks have re-emerged, particularly after the International Telecommunication Union released a part of the ultra-high frequency spectrum to mobile broadband services. The newly allocated spectrum, known as the digital dividend bands, was traditionally used throughout Europe for digital TV broadcasting. The emerging problem is the mutual interference between the new frequency spectrum utilized by the Mobile/Fixed Communication Networks and the band used by cable TV providers to offer their services. This article is a brief overview and a starting point for extensive research in this area. We started with a simple description of the cable television system and mobile/fixed communication networks focusing on the aspects associated with ingress and egress interference issues. We also discussed the approaches for detecting and measuring mutual interference and reviewed the relevant literature. This article is concluded with some proposed measures for reducing or mitigating mutual interference.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84341822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A practical framework to generate and manage synthetic sensor data","authors":"Zoltán Pödör, Anna Szabó","doi":"10.36244/icj.2022.2.7","DOIUrl":"https://doi.org/10.36244/icj.2022.2.7","url":null,"abstract":"A huge number of sensors are around us and they generate different kinds of data. Data owners, e.g. the companies need IT environments and applications to handle these datasets. The collected data often contain sensitive information about the operation of the companies and the production processes. Therefore, artificial sensor data are strongly needed in the development and testing phase of these applications. In this paper, we introduce a complex application with three main modules to manage synthetic sensor data. The first component is the data generator module, which is capable of creating synthetic sensor data according to the user-defined distributions and parameters. The second module is in charge of storing the generated data in a flexible relational database, developed by us. The third component ensures the filtering and the visualization of the collected or generated data. A common interface was created to bring together the components and to provide a unified interface for the users. The adequate user management was an important aspect of our work. Accordingly, four different user types and authorities were defined.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89738320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Some Recent European Cybersecurity Research and Innovation Projects","authors":"M. Çaglayan","doi":"10.36244/icj.2022.4.10","DOIUrl":"https://doi.org/10.36244/icj.2022.4.10","url":null,"abstract":"This paper reviews research from several EU Projects that have addressed cybersecurity using techniques based on Machine Learning, including the security of Mobile Networks and the Internet of Things (IoT). These research projects have considered IoT Gateways and their design, security and performance, the security of digital health systems that are interconnected across Europe to provide health services to pople who travel through the EU, and related issues of the energy consumption and sustainability in Information and Communication Technologies (ICT) and their cybersecurity. The methods used in much of these research projects are based on Machine Learning both for attack detection and dynamic attack mitigation, as well as performance analysis and measurement techniques based on applied probability models.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88490269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daryus Chandra, Panagiotis Botsinis, Dimitrios Alanis, Zunaira Babar, S. Ng, L. Hanzo
{"title":"On the Road to Quantum Communications","authors":"Daryus Chandra, Panagiotis Botsinis, Dimitrios Alanis, Zunaira Babar, S. Ng, L. Hanzo","doi":"10.36244/icj.2022.3.1","DOIUrl":"https://doi.org/10.36244/icj.2022.3.1","url":null,"abstract":"Moore’s Law has prevailed since 1965, predicting that the integration density of chips will be doubled approximately every 18 months or so, which has resulted in nanoscale in- tegration associated with 7 nm technologies at the time of writing. At this scale however we are about to enter the transitory range between classical and quantum physics. Based on the brilliant proposition by Feynman a new breed of information bearers was born, where the quantum bits are mapped for example to the spin of an electron. As a benefit, the alluring properties of the nano-scale quantum world have opened up a whole spate of opportunities in signal processing and communications, as discussed in this easy-reading discourse requiring no background in quantum physics.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73669615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fine-grained Dynamic Access Control Method for Power IoT Based on Kformer","authors":"Rixuan Qiu, Xue Xue, Mingliang Chen, Jinkun Zheng, Sitong Jing, Yuancheng Li","doi":"10.36244/icj.2022.4.11","DOIUrl":"https://doi.org/10.36244/icj.2022.4.11","url":null,"abstract":"The existing static ABAC(Attribute-Based Access Control) model cannot fully meet the increasingly complex, dynamic and scalable demands of the power grid. At the same time, its versatility and flexibility bring high costs. Additionally, the increasing complexity of organizational systems and the need for federated access to their resources make implementing and managing access control more challenging. This paper proposes a fine-grained dynamic access control method based on Kformer to automate authorization management tasks. We use Kformer, which filters and integrates external knowledge through feed-forward layers in Transformer. Then, we use BERT(Bidirectional Encoder Representations from Transformer) to perform feature extraction on the input fused text, extract the implied attribute-authority relationship from the log records and external documents, and finally, perform sequence modeling on the extracted attribute features and input the obtained results. The final authorization result is obtained by classification through the softmax function in the final fully connected layer. The authorization management of the user’s request to the object is dynamically completed. Finally, using the access data of the grid information system to evaluate the method proposed by us, the experimental results show that the model can continuously monitor the access behavior of users inside the grid information system, change the access rights of entities and adjust the policy in real-time, and carry out dynamic access authorization. At the same time, the accuracy of the generated access control policy can reach 87.73%.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74326635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wide Band Spectrum Monitoring System from 30MHz to 1800MHz with limited Size, Weight and Power Consumption by MRC-100 Satellite","authors":"Yasir Ahmed Idris Humad, L. Dudás","doi":"10.36244/icj.2022.2.6","DOIUrl":"https://doi.org/10.36244/icj.2022.2.6","url":null,"abstract":"Today, the usage of radio frequencies is steadily increasing based on the continuous development of modern telecommunication technologies, and this, in turn, increases the electromagnetic pollution not only on Earth but also in space. In low Earth orbit, electromagnetic pollution creates some kind of difficulty in controlling nano-satellites. So it is necessary to measure the electromagnetic pollution in the Low Earth Orbit. The basic aim of this paper is to present the capability of designing and developing a PocketQube-class satellite 3-PQ 5 x 5 x 15 cm as a potential continuation of SMOG-1, the fourth satellite of Hungary. The planned scientific payload of MRC- 100 is a wideband spectrum monitoring system for radio frequency smog in the frequency range of 30-2600 MHz on Low Earth Orbit (600 Km). In this paper, we have executed qualifying measurements on the whole system in the frequency range of 30-1800 MHz (first phase), and we calibrated its broadband antenna with a measurement system. We present the capabilities of the wideband spectrum monitoring system to measure radio frequency signals, with the limited size, weight, and power consumption of the designed system. The working spectrum measurement system was tested on the top of the roof of building V1 at BME University and An-echoic chamber, we were able to show that there is significant radio frequency smog caused by the upper HF band, FM band, VHF band, UHF band, LTE band, GSM band, 4G band, and UMTS band. This is relevant to the main mission target of MRC-100.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90592241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tushig Bat-Erdene, Y. N. H. Zayed, Xinyu Qiu, Ibrar Shakoor, Achref Mekni, P. A. Kara, M. Martini, L. Bokor, Anikó Simon
{"title":"On the Quality of Experience of Content Sharing in Online Education and Online Meetings","authors":"Tushig Bat-Erdene, Y. N. H. Zayed, Xinyu Qiu, Ibrar Shakoor, Achref Mekni, P. A. Kara, M. Martini, L. Bokor, Anikó Simon","doi":"10.36244/icj.2022.2.8","DOIUrl":"https://doi.org/10.36244/icj.2022.2.8","url":null,"abstract":"The turn of the decade introduced a new era of global pandemics to the world through the appearance of COVID-19, which is still an active crisis at the time of this paper. As a countermeasure, the phenomena of home office and online education became not only widely available, but also mandatory in many countries. However, the performance, reliability and general usability of such real-time activities may be severely affected by unfavorable network conditions. In both contexts, content sharing is now a common practice, and the success of the related use cases may fundamentally depend on it. In this paper, we present our surveys and subjective studies on the Quality of Experience of content sharing in online education and online meetings. A total of 6 surveys and 5 experiments are detailed, addressing topics of student experience, user interface settings, sharing options of lecturers and employees of the private sector, the perceivable effects of network impairments and the related long-term adaptation, the rubber band effect of slide sharing, the overall perceived quality and the separate quality aspects of media loading times, and the preference between visual quality, average frame rate and frame rate uniformity. The findings of the subjective studies do not characterize the use cases of the investigated topics on a general, widely-applicable level, as only a single online platform is involved throughout the experiments. However, their experimental configurations are reinforced by comprehensive surveys and many results indicate statistically significant differences between the selected test conditions.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90933148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER-Aware Backscattering Design for Energy Maximization at RFID Passive Tag","authors":"Amus Chee Yuen Goay, Deepak Mishra, Aruna Seneviratne","doi":"10.36244/icj.2022.4.7","DOIUrl":"https://doi.org/10.36244/icj.2022.4.7","url":null,"abstract":"AbsThe radio frequency identification (RFID) passive tag is wireless communication device with high energy sustainability, such that it uses the incident radio frequency (RF) signal to backscatter its information. This paper investigates the output load power maximization with optimal load impedances selection in the backscatter communication (BackCom) network. The considered BackCom system comprises a reader broadcasting an unmodulated carrier to the passive tag in the downlink. The tag backscatters its information signal to the reader with binary amplitude-shift keying (BASK) modulation in the uplink. We formulated an average output load power maximization problem by jointly optimizing the reflection coefficients while satisfying the minimum bit error rate (BER) requirement and tag sensitivity constraint. To simplify the problem, we transform the BER constraint to the modulation index constraint and reduce the 4 variables problem to 2 variables convex optimization problem. Using the Karush-Kuhn-Tucker (KKT) conditions, we design an algorithm to obtain the closed-form expression for the global optimal reflection coefficients that maximize the output load power. The simulation results provide insight into the impact of the information bit probability, tag sensitivity constraint, and BER on the achievable average load power. An overall gain of around 16% signifies the utility of our proposed design.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82872167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speaker Adaptation Experiments with Limited Data for End-to-End Text-To-Speech Synthesis using Tacotron2","authors":"A. Mandeel, M. Al-Radhi, T. Csapó","doi":"10.36244/icj.2022.3.7","DOIUrl":"https://doi.org/10.36244/icj.2022.3.7","url":null,"abstract":"Speech synthesis has the aim of generating humanlike speech from text. Nowadays, with end-to-end systems, highly natural synthesized speech can be achieved if a large enough dataset is available from the target speaker. However, often it would be necessary to adapt to a target speaker for whom only a few training samples are available. Limited data speaker adaptation might be a difficult problem due to the overly few training samples. Issues might appear with a limited speaker dataset, such as the irregular allocation of linguistic tokens (i.e., some speech sounds are left out from the synthesized speech). To build lightweight systems, measuring the number of minimum data samples and training epochs is crucial to acquire a reasonable quality. We conducted detailed experiments with four target speakers for adaptive speaker text-to-speech (TTS) synthesis to show the performance of the end-to-end Tacotron2 model and the WaveGlow neural vocoder with an English dataset at several training data samples and training lengths. According to our investigation of objective and subjective evaluations, the Tacotron2 model exhibits good performance in terms of speech quality and similarity for unseen target speakers at 100 sentences of data (pair of text and audio) with a relatively low training time.","PeriodicalId":42504,"journal":{"name":"Infocommunications Journal","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85141175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}