Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
Organization
Contents
ruSMART: New Generation of Smart Services
Requirements for Energy Efficient Edge Computing: A Survey
Abstract
1 Introduction
2 Definition of Edge and Fog
3 Benefits of the Edge Computing
4 Edge and Fog Computing Challenges
4.1 Methods for Reducing Energy Consumption in Wireless Sensor Networks
4.2 Data Compression Methods in Edge Device: Lossy and Lossless Methods
5 Wireless Technologies for Energy Efficient IoT
6 Energy Efficient IoT Protocols
7 Security and Privacy Issues in the Edge
8 Conclusions
References
Context-Based Cyclist Intelligent Support: An Approach to e-Bike Control Based on Smartphone Sensors
Abstract
1 Introduction
2 Related Work
3 An Approach to Cyclist Intelligent Support
4 Conclusion and Future Work
Acknowledgments
References
Context-Driven Heterogeneous Interface Selection for Smart City Applications
Abstract
1 Introduction
2 Background and Related Work
2.1 Context and Situation
2.2 Related Work
3 Method of Context-Driven Heterogeneous Interface Selection
3.1 Appropriate Modality Selection Algorithm
4 Implementation
5 Sample Scenarios and Testing
6 Conclusion
Acknowledgements
References
An Artificial Intelligence Based Forecasting in Smart Parking with IoT
Abstract
1 Introduction
2 Related Work
3 AI Genetic Algorithm for SC Generated Parking Data
3.1 IoT Generated Data at the SC Parking Places
3.2 Incorporated Evaluation Real Datasets
3.3 Genetic Algorithm
3.4 AI Experimental Results
4 AI Recurrent Neural Networks (RNN) and Data Forecasting
4.1 Incorporating AI RNN
4.2 Data Preparation
4.3 Learning on Datasets
5 Decision System
5.1 Car System and Use Case
5.2 Finding the Best Parking Lot Through the Prediction System
6 Conclusions and Future Work
Acknowledgments
References
On Data Stream Processing in IoT Applications
Abstract
1 Introduction
2 On Streams-Based Architectures
3 IoT Applications and Streams
4 On Streams-Based Algorithms
5 Conclusion
Acknowledgement
References
Analysis of Assets for Threat Risk Model in Avatar-Oriented IoT Architecture
1 Introduction
2 Place of Assets in Threat Risk Model
3 Architecture of IoT
3.1 Classical IoT Architecture
3.2 Avatar-Oriented IoT Architecture
4 Stakeholders and Assets
5 Conclusions
References
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
1 Introduction
2 Network Anomaly Detection with Deep Learning
2.1 Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks
2.2 DeepDefense: Identifying DDoS Attack via Deep Learning
2.3 Network Anomaly Detection Using Artificial Neural Networks
2.4 Network Anomaly Detection with Stochastically Improved Autoencoder Based Models
2.5 An Anomaly-Based Network Intrusion Detection System Using Deep Learning
2.6 Unsupervised Labeling for Supervised Anomaly Detection in Enterprise and Cloud Networks
2.7 IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach
2.8 Malware Traffic Classification Using Convolutional Neural Network for Representation Learning
2.9 Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism
3 Summary of Further Improvements
4 Conclusion
References
Targeted Digital Signage: Technologies, Approaches and Experiences
Abstract
1 Introduction
2 Research Method
3 Industrial Case and Previous Work
3.1 Industrial Case: Manufacturer of Elevators
3.2 Previous Work on Approach for Digital Business Model Development
4 Development of Targeted Digital Signage in the Industrial Case
4.1 Development Process and Results
4.2 Discussion
5 Framework for Targeted Digital Signage
5.1 Semantic Graph for Domain Representation
5.2 Information Confidentiality
6 Summary and Future Work
Acknowledgements
References
State of the Art Literature Review on Network Anomaly Detection
1 Introduction
2 Network Anomaly Detection
2.1 A Lightweight Network Anomaly Detection Technique
2.2 Distributed, Multi-level Network Anomaly Detection for Datacentre Networks
2.3 Distributed Network Anomaly Detection on an Event Processing Framework
2.4 Big Data Analytics for Network Anomaly Detection from Netflow Data
2.5 Entropy-Based Network Anomaly Detection
2.6 Combination of R1-PCA and Median LDA for Anomaly Network Detection
2.7 Integrating Short History for Improving Clustering Based Network Traffic Anomaly Detection
2.8 Network Anomaly Detection Based on Dynamic Hierarchical Clustering of Cross Domain Data
2.9 Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
3 Summary of Further Improvements
4 Conclusion
References
Creating a Schedule for Parallel Execution of Tasks Based on the Adjacency Lists
Abstract
1 Introduction
2 Related Work
3 Schedule Construction Method Based on Adjacency Lists
4 Schedule Optimization by the Number of Computing Nodes
5 Evaluation of Computing Resources Required for Maximum Acceleration
6 Comparison of the Method of Constructing a Schedule with the Help of Lists of Adjacencies with the Method Based on Matrices
7 Conclusion
Acknowledgments
References
Measuring a LoRa Network: Performance, Possibilities and Limitations
1 Introduction
2 Wireless Technologies for IoT
2.1 LPWAN Technologies
2.2 LoRa and LoRaWAN
3 Related Work
4 Materials and Methods
4.1 Case Study Topology
4.2 Types of Experiments
5 Results
6 Conclusions and Future Work
References
Testbed for Identify IoT-Devices Based on Digital Object Architecture
1 Introduction
2 Overview and Related Works
3 Digital Object Architecture
4 Testbed for Identify IoT-Devices
5 Results of Experiments
6 Conclusions
References
The Application of Graph Theory and Adjacency Lists to Create Parallel Queries to Relational Databases
Abstract
1 Introduction
2 Related Works
3 Formulation of the Problem
4 Methods for Organizing Parallel Execution of Queries
4.1 Parallel Execution of Queries Consisting of One or More Constructs «Select»
4.2 Parallel Execution of Complex Queries Consisting of Set of Subqueries
5 Testing
5.1 Testing Queries that Consist of One or More Constructions «Select»
5.2 Testing Complex Queries Consisting of Set of Subqueries
5.3 Automatic Parallelization of Queries
6 Conclusion
Acknowledgments
References
NEW2AN: Next Generation Wired/Wireless Advanced Networks and Systems
On the Necessary Accuracy of Representation of Optimal Signals
Abstract
1 Introduction
2 Optimization Criteria of Signal Form
3 Results and Discussion
References
On LDPC Code Based Massive Random-Access Scheme for the Gaussian Multiple Access Channel
1 Introduction
2 Iterative Joint Decoding Algorithm
3 PEXIT Charts
4 Numerical Results
5 Sparse Spreading of LDPC Codes
6 Conclusion
References
Application of Optimal Finite-Length Signals for Overcoming “Nyquist Limit”
Abstract
1 Introduction
2 Optimization Criteria of Signal Form
3 Solutions of Optimization Task
4 Euclidean Distance
5 Conclusions
References
Influence of Amplitude Limitation for Random Sequence of Single-Frequency Optimal FTN Signals on the ...
Abstract
1 Introduction
2 Signal Model
3 Amplitude Limiting Model
4 Spectral Characteristics
5 BER Performance
6 Conclusions
References
Spectral Efficiency Comparison Between FTN Signaling and Optimal PR Signaling for Low Complexity Det ...
Abstract
1 Introduction
2 BCJR Modification
3 Definition of Computational Complexity
4 Model Description
5 Simulation Results
6 Conclusions
References
A Method of Simultaneous Signals Spectrum Analysis for Instantaneous Frequency Measurement Receiver
1 Introduction
2 Theory of Operation
3 Basic Mathematical Relations
3.1 IFM Receiver operation algorithm
4 Simulation
5 Measurements
6 Conclusion
References
Analytical Models for Schedule-Based License Assisted Access (LAA) LTE Systems
Abstract
1 Introduction
2 System Model of LAA Schedule-Based System
2.1 Schedule-Based LAA Systems
2.2 System Model
3 Performance Evaluation Models
3.1 Streaming Traffic Without QoS Violation
3.2 Streaming Traffic with QoS Violation
3.3 Elastic Traffic Without QoS Violation
3.4 Elastic Traffic with QoS Violation
3.5 Performance Measures
4 Numerical Analysis
4.1 Models with Streaming Traffic
4.2 Models with Elastic Traffic
5 Conclusion
Acknowledgement
References
Kinetic Approach to Elasticity Analysis of D2D Links Quality Indicators Under Non-stationary Random Walk Mobility Model
Abstract
1 Introduction
2 Kinetic Model for SIR Analysis
2.1 The Kinetic Approach
2.2 Interference Assessment
2.3 Sensitivity Coefficients
3 The Kinetic Model of Non-stationary Random Walk
4 System Model of LAA Schedule-Based System
5 Conclusions
Acknowledgement
References
The Phenomenon of Secondary Flow Explosion in Retrial Priority Queueing System with Randomized Push-Out Mechanism
Abstract
1 Introduction
2 Preemptive Priority System
3 Non-preemptive Priority System
4 Computational Results
5 Conclusion
Acknowledgement
References
Comparison of LBOC and RBOC Mechanisms for SIP Server Overload Control
Abstract
1 Introduction
2 Simulation Model of System with Hysteretic Input Control
3 Results
4 Conclusion
Acknowledgement
References
Performance Analysis of Cognitive Femtocell Network with Ambient RF Energy Harvesting
1 Introduction
2 System Model
3 RF Energy-Harvesting Model of Cognitive Femtocell Network
4 An Algorithm for Energy Harvesting in Cognitive Femtocell Network
5 Simulation Results
6 Conclusion
References
Comparative Analysis of the Mechanisms for Energy Efficiency Improving in Cloud Computing Systems
1 Analysis of Mathematical Models of Mechanisms for Increasing the Energy Efficiency of Cloud Systems
2 Energy Consumption Indicators and the Performance Characteristics of Cloud Systems
3 Numeral analysis
4 Conclusion
References
Blue Team Communication and Reporting for Enhancing Situational Awareness from White Team Perspective in Cyber Security Exercises
1 Introduction
2 Finland's National Cyber Security Exercise
2.1 RGCE Cyber Range
3 Event Timelines
3.1 Injects
3.2 Communication Methods
4 Analysis
4.1 Team Communication Patterns
5 Reporting Tool for Improving White Team SA
5.1 Reporting Process and Software Tool
5.2 Reporting Format
6 Conclusion
References
An Approach to Classification of the Information Security State of Elements of Cyber-Physical System ...
Abstract
1 Introduction
2 Problem Statement
3 The Proposed Approach
4 Experiment
5 Conclusion
References
Signing Documents by Hand: Model for Multi-Factor Authentication
1 Introduction
2 Prototype Description
3 Utilized Hardware Modules
3.1 Authentication by Handwriting
3.2 Numerical Results
4 Benefits of Simultaneous Fingerprint Scanner Utilization
5 Applicable Stenographic Methods
6 Conclusions
References
System for Secure Computing Based on Homomorphism with Reduced Polynomial Power
1 Introduction
2 Secure Computation Background
3 Proposed Homomorphic System
4 Conclusions
References
An Approach to Selecting an Informative Feature in Software Identification
Abstract
1 Introduction
2 Calculation of Informative Features
3 Identification of Programs
4 Experiment Set up
5 Results
6 Conclusion
References
A-MSDU Frame Aggregation Mechanism Efficiency for IEEE 802.11ac Network. The Optimal Number of Frame ...
Abstract
1 Introduction
2 Related Works
3 The Model
4 The Efficiency of the A-MSDU Frame Aggregation Mechanism
5 Optimal Number of Frames Within A-MSDU Block
6 Conclusions
References
A Concise Review of 5G New Radio Capabilities for Directional Access at mmWave Frequencies
1 Introduction
2 5G New Radio Features
2.1 New Scalable Numerology and Frame Structure
2.2 Directivity and Beamforming at FR2
3 Initial Access in 5G NR
3.1 Stage I: Cell Search and Selection
3.2 Stage II: Random Access
3.3 Antenna Configurations
4 Conclusion
References
Energy - Aware Offloading Algorithm for Multi-level Cloud Based 5G System
Abstract
1 Introduction
2 Proposed Algorithm
3 Performance Evaluation
4 Conclusion and Future Work
Acknowledgement
References
Performance Analysis for DM-RS Mapping in a High Speed Train System
1 Introduction
1.1 A Subsection Sample
2 DM-RS Mapping in a HST Scenario
2.1 Requirements and Layout Configuration
2.2 DM-RS Mapping in NR
2.3 DM-RS Mapping for LOS Channel
3 Performance Analysis
4 Conclusions
References
Characterizing mmWave Radio Propagation at 60GHz in a Conference Room Scenario
1 Introduction
1.1 Motivation
1.2 Main Contributions
2 Our Scenario and Calibration with Measurement Data
3 Simulation Results at 60GHz
3.1 Human Body Blockage Models
3.2 Channel Characterization
4 Simulation Results for D2D Scenario at 60GHz
5 Conclusions and Discussion
References
Transmission of Augmented Reality Contents Based on BLE 5.0 Mesh Network
1 Introduction
2 Overview of Bluetooth 5.0 and BLE Mesh
3 Implementation Model
4 Simulation Modeling
5 Conclusion
References
Performance Limitations of Parsing Libraries: State-of-the-Art and Future Perspectives
1 Introduction and Overview
2 Design of Parsing Software for SDN
2.1 Configuration File Structure
3 Main Algorithm Functionality
4 Performance Evaluation and Benchmarks
5 Conclusions
References
Optimization Algorithm for IPTV Video Service Delivery over SDN Using MEC Technology
Abstract
1 Introduction
2 Background and Related Works
3 Deployment Architecture of the Experimental System
4 The Proposed Algorithm
5 Results
6 Conclusion
Acknowledgment
References
Analytical Modeling of Development and Implementation of Telecommunication Technologies
Abstract
1 Introduction
2 Description of the Mathematical Model
3 Analytical Modeling
3.1 Forming the Source Data
3.2 Determining the Dependence Parameters of the SEI and OEI
3.3 Determining the Dependence Parameters of the AEI
4 Analysis of Results and Conclusion
References
Resource Allocation for the Provision of Augmented Reality Service
1 Introduction
2 Service Model
3 Goal Formulation
4 Processing of Environment Data
5 Forming and Updating Data
6 Load and Data Distribution
7 Conclusion
References
Development of the Mechanism of Risk-Adjusted Scheduling and Cost Budgeting of R&D Projects in Telecommunications
Abstract
1 Introduction
2 Telecommunication Industry Outlook
3 Risk-Adjusted Cost and Schedule Management: A Literature Review
4 Investment Controlling in Innovation Project Management
5 Developing of the Mechanism of Risk-Adjusted Scheduling and Cost Budgeting of R&D Project
5.1 Mechanism’s Block Diagram
5.2 Phase 1: Generate Inputs of the Mechanism
5.3 Phase 2: Identification of Risks of Each Option
5.4 Phase 3: Analysis of Risks with RFMEA
5.5 Phase 4: Quantitative Assessment of Risk and Analysis of Output
5.6 Phase 5: Selection of the Optimal Option of Fulfillment of R&D Project
6 Conclusion
References
Towards Business Optimization and Development of Telecommunication Companies: Tools Analysis and Their Adaptation Opportunities
Abstract
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Conclusion
References
A Prospect Theoretic Look at a Joint Radar and Communication System
1 Introduction
2 Basic Model
3 The Jammer
4 Mode Selection Game
5 PT Solution for Mode Selection Game
6 Uncertainty About the Jammer's Position
7 PT Solution for Bayesion Game
8 Discussion of the Results and Conclusions
References
Algorithm for Positioning in Non-line-of-Sight Conditions Using Unmanned Aerial Vehicles
Abstract
1 Introduction
2 TDOA Measurement Processing Model
3 TDOA NLOS Measurement Processing Algorithm
4 Simulation Results
5 Conclusion
Acknowledgements
References
Features of the Development of Transceivers for Information and Communication Systems Considering the Distribution of Radar Operating Frequencies in the Frequency Range
Abstract
1 Introduction
2 Frequency Ranges of Radars for Various Purposes
3 Analysis of the Results
4 Conclusion
References
EMC Provision Method of LTE-800 Networks and Air Traffic Control Radars Based on Mechanism of Cell Radius Management for LTE Base Stations
Abstract
1 Introduction
2 Spectrum Sharing Features in 800 MHz Band
3 Providing Separation Distance by Base Station Cell Parameters Management, Other Than Power Control
4 The Drive Test Results
5 EMC Method Based on BS Power Control
6 Conclusion
References
A Lower Bound on the Average Identification Time in a Passive RFID System
1 Introduction
2 System Model
2.1 Main System Assumptions
2.2 Collision Resolution Algorithm (Q-algorithm)
3 Derivation of the Lower Bound of the Average Identification Time
4 Numerical Results
5 Conclusion
References
IoT Based Earthquake Prediction Technology
Abstract
1 Introduction
2 Related Works
3 The Architecture of the System
4 The Subsystem for Monitoring of the Activity of Animals Using Wearable Inertial Sensors
4.1 Data Collection
4.2 Recognizing Activity Using a Recurrent Neural Network
4.3 Calculation of Motor Activity
5 The Monitoring Subsystem Based on Use of Computer Vision Technologies
6 Conclusion
Acknowledgment
References
Interaction of AR and IoT Applications on the Basis of Hierarchical Cloud Services
1 Introduction
2 Related Works of IoT and AR
3 Scheme of Interaction Between IoT and AR
3.1 Structure of the Laboratory Stand
3.2 Estimation of Service Time
4 Tier Cloud Architecture for IoT/AR Services
5 Service System Model
6 Conclusion
References
AR Enabled System for Cultural Heritage Monitoring and Preservation
Abstract
1 Introduction
2 Background and Related Work
3 AR - IoT Based Cultural Heritage Framework
3.1 The Preventive Conservation Part
3.2 The Visitor Assistance Part
4 Experimental Evaluation
4.1 The Preventive Conservation Part
4.2 The Visitor Assistance Part
5 Conclusion
Acknowledgement
References
Distributed Streaming Data Processing in IoT Systems Using Multi-agent Software Architecture
Abstract
1 Introduction
2 State-of-the-Art Scientific Research in the Area of Streaming Data Processing
3 Mathematical Models and Formulation of the Problem
3.1 Model of Streaming Data Processing
3.2 Model of the Resource Consumption in Computer Networks
3.3 Formulation of the Optimal Resource Allocation Problem
4 Agent-Based Software Architecture for PSSD Systems
4.1 The Target Agent’s Architectural Features
4.2 Management Within the Agent-Based Software Architecture
4.3 Tasks Specification Description Language
5 Software Implementation of Multi-agent Architecture for Distributed PSSD Systems and Examples of Using
5.1 Networked Control Systems (NCS)
6 Conclusion
References
Optimization of Routes in the Internet of Things
Abstract
1 Introduction
2 Overview and Related Work
3 Problem Statement
4 Model and Method of Route Selection
5 Conclusions
References
Chirped Fiber Grating Beamformer for Linear Phased Array Antenna
Abstract
1 Introduction
2 Photonic Beamformer Model Design and Setup
3 Chirped Fiber Bragg Grating Characterization
4 Far-Field Pattern Calculations and Measurements for PAA with Optical Time Delay Unit Based on Chir ...
4.1 6-Channel PAA Far Field Pattern Calculations
4.2 Measurements of Chirped FBG Beamformer Channels Characteristics
4.3 Measurements of Far-Field Patterns of 6-Elements PAA with Chirped FBG Based BF
5 Conclusion
References
Design and Analysis of Circular-Polarized Patch Antenna at S-band for a Nanosatellite
1 Introduction
2 Antenna Design
3 Simulation and Measurement Results
4 Conclusions
References
The Casimir-Operated Microdevice for Application in Optical Networks
1 Introduction
2 Sketch of the Setup
3 The Casimir Pressure in the Microresonator
4 The Pressure of Light and the Cyclic Process
5 Conclusions
References
Features of Transmission of Intermediate Frequency Signals over Fiber-Optical Communication System in Radar Station
Abstract
1 Introduction
2 Features of Transmission of Intermediate Frequency Signals over Fiber-Optical Communication System
3 Results and Discussion
4 Conclusion
References
Fiber Optic Current Meter for IIoT in Power Grid
Abstract
1 Introduction
2 Current Meter Optical Scheme
2.1 Description
2.2 Circuit Operation Principle
3 Signal Demodulation Method
4 Compensation of the Result Dependence on the Modulation Amplitude
5 Implementation
6 Conclusions
Acknowledgments
References
Some Directions of Quantum Frequency Standard Modernization for Telecommunication Systems
Abstract
1 Introduction
2 Principles of Cesium Atomic Clock Operation
3 Cesium Atomic Clock Frequency Synthesizer
4 Magnetic Field Stabilization System
5 Conclusion
References
Nanocommunication System with a Laser Activated Molecular Film
Abstract
1 Introduction
2 Experimental
2.1 Experimental Setup
2.2 Samples
2.3 Detection System
3 Results and Discussion
4 Conclusion
Acknowledgements
References
Graphene-Coated Substrate as a Basis for Nano-Antennae
Abstract
1 Introduction
2 Structure
3 Sketch of the Structure
4 Theory
5 Discussion
References
Synthesis of the Demodulation Algorithm for the Phase Modulated Signals in Presence of the Background Noise Using Complete Sufficient Statistics
Abstract
1 Introduction
2 Mathematical Model of a Signal. Synthesis of the Estimation Algorithm
3 The Simulation Results of the Phase Demodulation Algorithm
4 Conclusion
Acknowledgment
References
Dynamics of Polypeptide Cluster Dipole Moment for Nano Communication Applications
Abstract
1 Introduction
2 Methods
2.1 Computer Simulation
2.2 Molecular Film Conductivity Measurements
3 Results and Discussion
3.1 Computer Simulation
3.2 Conductivity Measurements
4 Conclusion
References
X-Ray Scattering by Antiphase Ferroelectric Domain Walls in the Antiferroelectric Phase of the PbZr0.985Ti0.015O3
1 Introduction
2 Experiment
3 Results and Discussions
3.1 Measurements Without Electric Field
3.2 Measurements on the Applied Electric Field
4 Summary
References
Study of Self-assembled Molecular Films as a Method of Search for Promising Materials in Nanoelectronics and Nanocommunications
Abstract
1 Introduction
2 Experiments and Discussion
2.1 Experimental Techniques
2.2 Solutions Under Study
2.3 Albumin Water Solutions During Dehydration in Different Petri Dishes
2.4 Albumin Solutions Near the Isoelectric Point
2.5 Albumin Normal Saline Solutions
2.6 Albumin Solutions on the Border of Different Substrate Surfaces
2.7 Albumin Under the Influence of Various Magnetic Fields
3 Conclusions
References
Author Index
← Prev
Back
Next →
← Prev
Back
Next →