Skip to main content
Top

2016 | Book

Internet of Things, Smart Spaces, and Next Generation Networks and Systems

16th International Conference, NEW2AN 2016, and 9th Conference, ruSMART 2016, St. Petersburg, Russia, September 26-28, 2016, Proceedings

insite
SEARCH

About this book

This book constitutes the joint refereed proceedings of the 16th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2016, and the 9th Conference on Internet of Things and Smart Spaces, ruSMART 2016, held in St. Petersburg, Russia, in September 2016. The 69 revised full papers were carefully reviewed and selected from 204 submissions. The 12 papers selected for ruSMART are organized in topical sections on new generation of smart services; smart services serving telecommunication networks; role of context for smart services; and smart services in automotive industry.

The 57 papers from NEW2AN deal with the following topics: cooperative communications; wireless networks; wireless sensor networks; security issues; IoT and industrial IoT; NoC and positioning; ITS; network issues; SDN; satellite communications; signals and circuits; advanced materials and their properties; and economics and business.

Table of Contents

Frontmatter

ruSMART: New Generation of Smart Services

Frontmatter
Forecasting Youth Unemployment in Korea with Web Search Queries

Governments increase budget expenditure for youth job creation, but youth job markets tightened by prolonged recession are not improved as expected. To ease the problem of youth unemployment, developing relevant policies is important but more accurate and rapid prediction is also critical. This research develops a prediction model additionally utilizing web query information in classical statistical prediction model. Often ARIMA model is applied to estimate unemployment rate. For identified ARIMA model for Korean youth unemployment rate, we apply web query information to improve the accuracy of prediction. Our suggested model shows better performance than ARIMA model with respect to mean squared errors of estimate and prediction. We hope this research will be useful in developing a more improved model to estimate variable of interest.

Chi-Myung Kwon, Jae Un Jung
Competency Management System for Technopark Residents: Smart Space-Based Approach

Technopark is a union of companies called residents that implement innovation activities. Development of the competence management system for technoparks is currently a relevant task. Such system allows automating the process of resident’s search that can satisfy potential customer tasks. The paper presents a smart space-based approach for competence management system development and implementation. Every resident is described by a profile that is shared with the smart space and becomes accessible for other competence management system users. The profile consists of several competencies and evidences with skills levels characterized their degree of possession.

Alexander Smirnov, Alexey Kashevnik, Segey Balandin, Olesya Baraniuc, Vladimir Parfenov
Data Mining for the Internet of Things with Fog Nodes

The paper describes an approach of applying an actor model that executes Data Mining algorithms to analyze data in IoT systems with a distributed architecture (with Fog Computing). The approach allows to move computational load closer to the data, thus increasing performance of the analysis and decreasing network traffic. Execution of the 1R algorithm in an IoT system with a distributed architecture and the results of the comparison of distributed and centralized architectures are shown in the paper.

Ivan Kholod, Ilya Petuhov, Maria Efimova

ruSMART: Smart Services Serving Telecommunication Networks

Frontmatter
Neural Network System for Monitoring State of a Optical Telecommunication System

The paper presents a methodology for the synthesis of systems for monitoring the state of a fiber-optical linear path of the optical transport networks, based on the information and measuring control system that implements neural network recognition algorithms with synthesis by dominance. The proposed information-measuring system processes levels of the average intensity of the optical signal received at various carriers in a certain retrospective over a defined period of time. It is seen that the reliability of control increases with the growth of size of the watch window.

Anton Saveliev, Sergey Saitov, Irina Vatamaniuk, Oleg Basov, Nikolay Shilov
Optimization Algorithm for an Information Graph for an Amount of Communications

In connection with the annual increase in the volume of processed data and raising the importance of computer modeling of real objects and processes, requirement to improve the technology of parallel algorithms is increasing. Successful implementation of parallel algorithms on supercomputers depends on several parameters, one of which is the amount of inter-processor data transfers. Starting at a particular number of processors, computational speedup falls due to increased volume of data transmission. For some algorithms this dependence is a linear decreasing function. Imbalance of volume of calculations and complexity of data transmission operations increases with the rising of the number of processors. In this article we present the results of investigations of dependence of the density and algorithm execution time on the amount of interprocessor transfers. Also, we present a method of reducing interprocessor communications through more efficient distribution of operations of the algorithm by processes. This method does not account for the execution time of the operations themselves, but it is a foundation for more improved methods of multiparametric optimization of parallel algorithms.

Yulia Shichkina, Mikhail Kupriyanov, Mohammed Al-Mardi
Application of Fuzzy Sections for Constructing Dynamic Routing in the Network DTN

This article provides a methodology for construction of data transfer paths through DTN dynamic network, implemented with the devices mounted on moving objects and connected via WI-FI, Bluetooth and LTE D2D. The methodology covers all the five stages of the Knowledge Discovery in Databases technology. The stage of application of Data Mining tools was studied in more detail. It is based on the application of fuzzy logic instrument to select subset that meet the network parameters from a set of moving objects. Further application to the subset of related objects of Yen’s algorithm of search for optimal paths on a weighted graph with weights of the grade of the selected subset ownership of the object allows to build the most credible data transfer path and several alternative paths, ranked by descending of data delivery probability.

Yulia Shichkina, Mikhail Kupriyanov, Anastasia Plotnikova, Yaroslav Domaratsky
Strategic Analysis in Telecommunication Project Management System

A lot of issues are tackled in the project management system in the field of telecommunications. The most important one for achieving companies’ strategic goals is a process of selecting an optimal project portfolio. Strategic analysis of the external and internal business environment the company operates in has an important impact when selecting such a portfolio. Since the business environment in telecommunications is developing dynamically and the competition is fierce, assessment indicators, analysis methods and tools must be carefully selected so that the costs of analysis and further application of a mechanism for selecting an optimal project portfolio would not exceed the benefits of its use.

Ekaterina Abushova, Ekaterina Burova, Svetlana Suloeva

ruSMART: Role of Context for Smart Services

Frontmatter
RCOS: Real Time Context Sharing Across a Fleet of Smart Mobile Devices

Sharing context is a key challenge and will be a requirement of future IoT systems and services. To this end, in this paper, we propose, develop, implement and validate a Real Time Context Sharing (RCOS) system. RCOS takes advantage of the widely used publish/subscribe paradigm embedding context-awareness. We also propose a new context-aware subscription language enabling publishers to express data with sufficient contextual information and subscribers to subscribe to data by matching publisher context to subscribers contextual preferences. Finally, as a proof of concept, we extend the Apache ActiveMQ Artemis software and create a client prototype. We evaluate our proof of concept for larger scale deployment.

Julien Dhallenne, Prem Prakash Jayaraman, Arkady Zaslavsky
Reasoning over Knowledge-Based Generation of Situations in Context Spaces to Reduce Food Waste

Situation awareness is a key feature of pervasive computing and requires external knowledge to interpret data. Ontology-based reasoning approaches allow for the reuse of predefined knowledge, but do not provide the best reasoning capabilities. To overcome this problem, a hybrid model for situation awareness is developed and presented in this paper, which integrates the Situation Theory Ontology into Context Space Theory for inference. Furthermore, in an effort to rely as much as possible on open IoT messaging standards, a domain-independent framework using the O-MI/O-DF standards for sensor data acquisition is developed. This framework is applied to a smart neighborhood use case to reduce food waste at the consumption stage.

Niklas Kolbe, Arkady Zaslavsky, Sylvain Kubler, Jérémy Robert
Storing and Indexing IoT Context for Smart City Applications

IoT system interoperability, data fusion, data discovery and access control for providing Context-as-a-Service as well as tools for building context-aware smart city applications are all significant research challenges for IoT-enabled smart cities. These middleware platforms have to cope with potentially big data generated from millions of devices in large cities. The amount of context, metadata, annotations in IoT ecosystems equals and may even exceed the amount of raw data. This paper discusses the challenges of context storage, retrieval and indexing for smart city applications. We analyse, compare and categorise existing approaches, tools and technologies relevant to the identified challenges. The paper proposes a conceptual architecture of a hybrid context storage and indexing mechanism that enables and supports the Context Spaces theory based representation of context for large-scale smart city applications. We illustrate the proposed approach using solid waste management system with adaptive on-demand garbage collection from IoT-enabled garbage bins.

Alexey Medvedev, Arkady Zaslavsky, Maria Indrawan-Santiago, Pari Delir Haghighi, Alireza Hassani

ruSMART: Smart Services in Automotive Industry

Frontmatter
“Connected Car”-Based Customised On-Demand Tours: The Concept and Underlying Technologies

Wide spreading of such concepts as ubiquitous computing, connectivity, cyberphysical systems, Internet of Things opens various possibilities both in increasing the human productivity in various tasks and developing new business models that allow companies to transform from product suppliers to service providers or even to virtual companies acting as brokers. The paper proposes a concept of customised on-demand tours by cars or minivans as one of the phenomena of the above transformation. It also describes the technological basis underlying the concept and explains the proposed scenario via an illustrative case study.

Alexander Smirnov, Nikolay Shilov, Oleg Gusikhin
Smart Driving: Influence of Context and Behavioral Data on Driving Style

In this article, we present an approach to determine stress level in a non-invasive way using a smartphone as the only and sufficient source of data. We also present the idea of how to partly transfer such approach to the determination of the driving style, as aggressive driving is one of the causes of car accidents. For determination of the driving style a variety of methods are used including the preparation movements before maneuvers, identification of steering wheel angle, accelerator and brake pedal pressures, glance locations, facial expressions, speed, medical examinations before driving as well as filling out of the questionnaires after the journey. In our paper we present a methodology for estimation of potentially unsafe driving (in the meaning of more intensive acceleration and braking compared to average driving) and discuss how to estimate such unsafe driving before it actually takes place. We present sensors and data which can be used for these purposes. Such data include heart rate variability from chest belt sensor, behavioral and contextual data from smartphone, STAI short questionnaire to assess personal anxiety and anxiety as a state at certain moment, and initial interaction with car during opening and closing of the car doors. To determine intensive acceleration and braking we analyzed GPS data like speed, acceleration and also data from accelerometer inside the car to avoid interference in GPS-signal. Actually, our long term goals are to provide feedback about potentially unsafe driving in advance and thus strengthening driver’s attention on the driving process before the start.

Mikhail Sysoev, Andrej Kos, Matevž Pogačnik

NEW2AN: Cooperative Communications

Frontmatter
A Source Prioritizing Scheme for Relay Cooperative Networking

This paper elaborates on the rising important paradigm of cooperative communications and suggests a novel algorithm that enhances performance at low complexity. Our motivation emerges from a channel constrained context, like e.g., cognitive networks, where communication channel distribution, as well as relay assignment, play a pivotal role for the total network throughput and the overall performance. The proposed scheduling scheme attempts to maximize the overall throughput by maximizing the number of transmission sources. Moreover, simulation results for the impact of the number of relays and the available communication channels are provided. The results show that the use of a suitable number of relays produces a severe improvement in the network’s overall throughput. On the other hand, applying more communication channels tends to remove these benefits.

Ioannis Giannoulakis, Emmanouil Kafetzakis, Anastasios Kourtis
QoS Aware Admission and Power Control for Two-Tier Cognitive Femtocell Networks

In two-tier femtocell networks, the femtocell users (FUs) can be admitted to the femto base stations (FBSs) provided that the interference to the primary users (PUs) is no higher than the defined thresholds. Moreover, several FBSs may require different quality of service (QoS) with different payments. This paper proposes a method to obtain from maximally achievable revenue from FBSs to the required QoS. It also proposes an efficient QoS aware admission algorithm which is compared with other schemes, such as minimum signal-to-interference-plus-noise ratio (SINR) removal algorithm (MSRA) and random SU removal algorithm (RSRA). Presented QoS aware admission algorithm can achieve a much higher revenue with required QoS. In addition, the proposed algorithm is evaluated by the simulation experiments.

Jerzy Martyna

NEW2AN: Wireless Networks

Frontmatter
Improving Efficiency of Heterogeneous Wi-Fi Networks with Energy-Limited Devices

A heterogeneous wireless network consists of various devices that generate different types of traffic with heterogeneous requirements for bandwidth, maximal delay and energy consumption. An example of such networks is a Wi-Fi HaLow network that serves a big number of Machine Type Communication battery-powered devices and several offloading client stations. The first type of devices requires an energy-efficient data transmission protocol, while the second one demands high throughput. In this paper, we consider a mechanism that allocates a special time interval (Protected Interval) inside of which only battery powered-powered devices can transmit. We show that appropriate selection of the Protected Interval duration allows battery-powered devices to consume almost the minimal possible amount of energy on the one hand, and to provide almost the maximal throughput for offloading stations on the other hand. To find such duration, we develop a mathematical model of data transmission in a heterogeneous Wi-Fi network.

Dmitry Bankov, Evgeny Khorov, Aleksey Kureev, Andrey Lyakhov
Mathematical Model of QoS-Aware Streaming with Heterogeneous Channel Access in Wi-Fi Networks

In Wi-Fi networks, preliminary channel reservation protects transmissions in reserved time intervals from collisions with neighboring stations. However, making changes in established reservations takes long time spent on negotiating changes with neighboring stations and dissemination of information about these changes. This complicates serving of Variable Bit Rate (VBR) flows which intensity varies with time, what leaves no choice but to reserve some additional time for handling data bursts and packet retransmissions (caused by random noise and interference from remote stations). In the paper, we consider a more flexible approach when bursts and retransmissions are handled by some random access method while a constant part of an input flow is served in preliminarily reserved intervals. We build a mathematical model of a VBR flow transmission process with this heterogeneous access method and use the model to find transmission parameters which guarantee that Quality of Service requirements of the flow are satisfied at the minimal amount of used channel time.

Alexander Ivanov, Evgeny Khorov, Andrey Lyakhov, Ilya Solomatin
Mobility Load Balancing Enhancement for Self-Organizing Network over LTE System

The objective of mobility load balancing (MLB) is to intelligently spread user traffic load out on a network in order to avoid degradation of end-user experience and performance due to overloaded or congested cells. The load standard deviation (LSD) as a new key performance indicator (KPI) for MLB performance evaluation has been proposed in the paper. The paper aims to minimize the LSD over network level for equally spreading cell load out on a network with low radio resource control (RRC) signaling load. To support the MLB function enhancement for self-organizing network (SON), the novel MLB algorithm has been proposed in this paper. The performance of the algorithm has been analyzed and compared through computer simulations as well.According to the results, we found that the proposed MLB algorithm can reduce the LSD from 7.48 % to 60.74 %. On the other hand, we observed that the proposed MLB algorithm required 10.79 % more handovers than the non-MLB operation.Moreover, the overall number of RLF was produced as many as 140 from the proposed MLB algorithm operation. This information indicates that MLB and mobility robustness optimization (MRO) coordination is needed for reducing the number of RLF. Furthermore, looking at the impacts of RLF, we can conclude that MRO should have higher priority than MLB.

Sangchul Oh, Hongsoog Kim, Jeehyeon Na, Yeongjin Kim, Sungoh Kwon
Optimizing Network-Assisted WLAN Systems with Aggressive Channel Utilization

Cellular network assistance over unlicensed spectrum technologies is a promising approach to improve the average system throughput and achieve better trade-off between latency and energy-efficiency in Wireless Local Area Networks (WLANs). However, the extent of ultimate user gains under network-assisted WLAN operation has not been explored sufficiently. In this paper, an analytical model for user-centric performance evaluation in such a system is presented. The model captures the throughput, energy efficiency, and access delay assuming aggressive WLAN channel utilization. In the second part of the paper, our formulations are validated with system-level simulations. Finally, the cases of possible unfair spectrum use are also discussed.

Aleksandr Ometov, Sergey Andreev, Alla Levina, Sergey Bezzateev
Randomized Priorities in Queuing System with Randomized Push-Out Mechanism

For queuing systems with two incoming flows and single channel with randomized priority and push-out mechanism were obtained analytical expressions of generating function and loss probabilities. As general parameters for model control were used push-out probability $$ 0 \le \alpha \le 1 $$ and probability of selecting service packets from first flow rather than second $$ 0 \le \beta \le 1 $$. Theoretically and experimentally found that in certain combinations of incoming flows load factors loss probabilities dependence may be linear. This behavior is called “law of linear losses”. Areas where this effect is shown are called “areas of linear behavior”. In article shown such areas for considered randomized priorities system.

Alexander Ilyashenko, Oleg Zayats, Vladimir Muliukha

NEW2AN: Wireless Sensor Networks

Frontmatter
Improving Energy-Awareness in Selective Reprogramming of WSNs

Saving energy is considered one of the main challenges in wireless sensor networks (WSNs), being radio activities such as message transmission/reception and idle listening the main factors of energy consumption in the nodes. These activities increase with the increase of reliability level required, which is usually achieved through flooding strategies. Procedures such as remote WSNs reprogramming require high-level of reliability leading to an increase in radio activity and, consequently, waste of energy. This energy waste is magnified when dealing with selective reprogramming where only few nodes need to receive the code updates. The main focus of this paper is on improving energy efficiency during selective reprogramming of WSNs, taking advantage of wise routing, decreasing the nodes’ idle listening periods and using multiple cooperative senders instead of a single one. The proposed strategies are a contribution toward deploying energy-aware selective reprogramming in WSNs.

Hadeel Abdah, Emanuel Lima, Paulo Carvalho
Modified Elastic Routing to Support Sink Mobility Characteristics in Wireless Sensor Networks

This paper presents improvements for the geographic routing protocol Elastic so to support the different sink mobility characteristics. We have proposed a strategy to support multiple mobile sinks; tested Elastic under high speeds of the mobile sink; proposed two strategies in case of the sink temporary absence and finally proposed to predict the sink location by the source node and then by all the nodes. Simulation results show that our propositions improve much the delivery ratio and reduce the delivery delay.

Imane Benkhelifa, Nassim Belmouloud, Yasmine Tabia, Samira Moussaoui
Connectivity Estimation in Wireless Sensor Networks

The connectivity of a wireless sensor network is one of the most important indicators of the network capabilities. This article describes the characteristics of connectivity and proposed a method of its estimation for wireless sensor networks. We use the Erdos-Renyi’s model for random graphs as the connectivity model. The applicability of this model to connectivity estimation of the network with different number of nodes was investigated. A possibility of using UAVs for improving the connectivity in wireless sensor network was also considered.

Ilhom Nurilloev, Alexander Paramonov, Andrey Koucheryavy

NEW2AN: Security Issues

Frontmatter
Survey: Intrusion Detection Systems in Encrypted Traffic

Intrusion detection system, IDS, traditionally inspects the payload information of packets. This approach is not valid in encrypted traffic as the payload information is not available. There are two approaches, with different detection capabilities, to overcome the challenges of encryption: traffic decryption or traffic analysis. This paper presents a comprehensive survey of the research related to the IDSs in encrypted traffic. The focus is on traffic analysis, which does not need traffic decryption. One of the major limitations of the surveyed researches is that most of them are concentrating in detecting the same limited type of attacks, such as brute force or scanning attacks. Both the security enhancements to be derived from using the IDS and the security challenges introduced by the encrypted traffic are discussed. By categorizing the existing work, a set of conclusions and proposals for future research directions are presented.

Tiina Kovanen, Gil David, Timo Hämäläinen
Architecture for the Cyber Security Situational Awareness System

Networked software systems have a remarkable and critical role in the modern society. There are critical software systems in every business area. At the same time, the amount of cyber-attacks against those critical networked software systems has increased in large measures. Because of that, the cyber security situational awareness of the own assets plays an important role in the business continuity. It should be known what is the current status of the cyber security infrastructure and own assets and what it will be in the near future. For achieving such cyber security situational awareness there is need for the Cyber Security Situational Awareness System. This study presents the novel architecture of the Cyber Security Situational Awareness System. The study also presents the use case of threat mitigation process for such Cyber Security Situational Awareness System.

Tero Kokkonen
Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques

The paper presents the results of the design and implementation of detection system against DDoS attacks for OpenStack cloud computing platform. Proposed system uses data mining techniques to detect malicious traffic. Formal models of detecting components are described. To train data mining models real legitimate traffic was combined with modelled malicious one. Paper presents results of detecting the origin of DDoS attacks on cloud instances.

Konstantin Borisenko, Andrey Rukavitsyn, Andrei Gurtov, Andrey Shorov
Investigation of Protection Mechanisms Against DRDoS Attacks Using a Simulation Approach

Nowadays, permanent availability is crucial for a growing number of computer services. An increasing quantity and power of DoS attacks frequently disrupts online network communication. Therefore it is important to create new effective defense methods for networks. In this paper we outline a programming library for the simulation of distributed reflected denial of service attacks and security mechanisms against them. Using this framework, a protection mechanism to detect and mitigate DRDoS attacks based on DNS and NTP protocols is developed. To evaluate the effectiveness of the proposed protection mechanism, a series of experiments was conducted. Also a comparison between the proposed protection mechanism and the protection mechanisms proposed by other researchers was carried out.

Yana Bekeneva, Nikolay Shipilov, Andrey Shorov
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic

Distributed denial-of-service (DDoS) attacks are one of the most serious threats to today’s high-speed networks. These attacks can quickly incapacitate a targeted business, costing victims millions of dollars in lost revenue and productivity. In this paper, we present a novel method which allows us to timely detect application-layer DDoS attacks that utilize encrypted protocols by applying an anomaly-based approach to statistics extracted from network packets. The method involves construction of a model of normal user behavior with the help of weighted fuzzy clustering. The construction algorithm is self-adaptive and allows one to update the model every time when a new portion of network traffic data is available for the analysis. The proposed technique is tested with realistic end user network traffic generated in the RGCE Cyber Range.

Mikhail Zolotukhin, Tero Kokkonen, Timo Hämäläinen, Jarmo Siltanen
Dynamic Trust Management Framework for Robotic Multi-Agent Systems

A lot of research attention has recently been dedicated to multi-agent systems, such as autonomous robots that demonstrate proactive and dynamic problem-solving behavior. Over the recent decades, there has been enormous development in various agent technologies, which enabled efficient provisioning of useful and convenient services across a multitude of fields. In many of these services, it is required that information security is guaranteed reliably. Unless there are certain guarantees, such services might observe significant deployment issues. In this paper, a novel trust management framework for multi-agent systems is developed that focuses on access control and node reputation management. It is further analyzed by utilizing a compromised device attack, which proves its suitability for practical utilization.

Igor Zikratov, Oleg Maslennikov, Ilya Lebedev, Aleksandr Ometov, Sergey Andreev

NEW2AN: IoT and Industrial IoT

Frontmatter
Supernodes-Based Solution for Terrestrial Segment of Flying Ubiquitous Sensor Network Under Intentional Electromagnetic Interference

This paper is dedicated to the study of the functions of the terrestrial segment of flying ubiquitous sensor network under intentional electromagnetic interference conditions. The main feature of this influence is the violation of the integrity of the WSN and a temporary failure of nodes located in the influence zone. The aim of the study is to prove that, under IEMI conditions, there is a supernodes-based solution to ensure the functioning of the WSN. The obtained results can be used in selecting models of changing network functionality under the influence of interference so as to maintain the network stability.

Trung Hoang, Ruslan Kirichek, Alexander Paramonov, Andrey Koucheryavy
A New Centralized Link Scheduling for 6TiSCH Wireless Industrial Networks

Industrial wireless sensor networks require high reliability, low power usage, and timely exchange of information. To meet these requirements, the IEEE 802.15.4e time slotted channel hopping (TSCH) medium access control (MAC) protocol was developed. The recently created IETF 6TiSCH working group (WG) is implementing a protocol stack based on the Internet of Things (IoT) standard, such as the RPL routing protocol, 6LoWPAN, and CoAP, in order to enable IPv6 on IEEE 802.15.4e TSCH. This paper presents a new Centralized Link Scheduling (CLS) algorithm for operation in 6TiSCH networks. The CLS algorithm constructs efficient multi-hop schedules using a minimal number of centralized control messages, because it allocates and deallocates slots without rescheduling the entire schedule. Simulation results show that our CLS algorithm requires smaller control messages for scheduling formation than the Decentralized Traffic Aware Scheduling (DeTAS) algorithm, implemented in 6TiSCH networks, does.

Kang-Hoon Choi, Sang-Hwa Chung
Coverage and Network Requirements of a “Big Data” Flash Crowd Monitoring System Using Users’ Devices

Over the last decade aural and visual monitoring of massive people gatherings has become a critical problem of national security. Whenever possible a fixed infrastructure is used for this purpose. However, in case of spontaneous gatherings the infrastructure may not be available. In this paper, we propose the system for spontaneous “flash crowd” monitoring in areas with no fixed infrastructure. The basic concept is to engage users with their mobile devices to participate in the monitoring process. The system takes on characteristics of “big data” generators. We analyze the proposed system for coverage metrics and estimate the rate imposed on the wireless network. Our results show that given a certain level of participation the LTE network can support aural monitoring with prescribed guarantees. However, the modern LTE system cannot fully support visual monitoring as much more capacity is required. This capacity may potentially be provided by forthcoming millimeter wave and terahertz communications systems.

An Nguyen, Mikhail Komarov, Dmitri Moltchanov
Innovation Radar as a Tool of 5G Development Analysis

5G Technologies and network development requires all players in the mobile market to participate in the formation of long-term strategy. This includes regulatory authorities, network equipment manufacturers, manufacturers of user equipment, application developers and operators. At the current stage of development of 5G technologies and service applications, a comprehensive analysis of the innovative solutions already offered by major world vendors, research branches of telecom operators, universities and start-up companies should form the basis for long-term strategy. This paper considers an approach to the analysis of innovation by the creation of an information product - 5G Innovation Radar. The product includes the results of a global scouting of 5G innovations, selection and international expertise of the most promising solutions, ranking of 5G innovations by selected criteria of importance and the formation of individual development scenarios, taking into account the activity of each player on the national telecom market. The paper submitted also includes a comparative analysis of innovation assessment results at various stages of the development of 5G Innovation radar.

Valery Tikhvinskiy, Grigory Bochechka, Alexander Minov, Andrey Gryazev
Analytical Evaluation of D2D Connectivity Potential in 5G Wireless Systems

Constantly growing number of wireless devices leads to the increasing complexity of maintenance and requirements of mobile access services. Following this, the paper discusses perspectives, challenges and services of 5th generation wireless systems, as well as direct device-to-device communication technology, which can provide energy efficient, high throughput and low latency transmission services between end-users. Due to these expected benefits, the part of network traffic between mobile terminals can be transmitted directly between the terminals via established D2D connection without utilizing an infrastructure link. In order to analyse how frequently can be such direct connectivity implemented, it is important to estimate the probability of D2D communication for arbitrary pair of mobile nodes. In this paper, we present the results of the network modelling when the random graph model is used. The model was implemented as a simulation program in C# which generates random graph with a given number of vertexes and creates the minimal spanning tree (mst) by using the Prime’s algorithm. All our result and practical findings are summarized at the end of this manuscript.

Ammar Muthanna, Pavel Masek, Jiri Hosek, Radek Fujdiak, Oshdi Hussein, Alexander Paramonov, Andrey Koucheryavy
Queuing Model with Unreliable Servers for Limit Power Policy Within Licensed Shared Access Framework

Shared access to spectrum by several parties seems to become one of the most promising approaches to solve the problem of radio spectrum shortage. The framework proposed by ETSI, licensed shared access (LSA), gives the owner absolute priority in spectrum access, to the detriment of the secondary user, LSA licensee. The latter can access the spectrum only if the owner’s QoS is not violated. If the users of both parties need continuous service without interruptions, the rules of shared access should guarantee the possibility of simultaneous access. Balancing the radio resource occupation between parties could take quite a long time compared to the dynamics of the system due to the coordination process by the national regulation authority (NRA). We examine a scheme of the simultaneous access to spectrum by the owner and the LSA licensee that minimizes the coordination activities via NRA. According to this scheme, when the owner needs the spectrum, the power of the LSA licensee’s eNB/UEs is limited. From the LSA licensee’s perspective, the scheme is described in the form of a queuing system with reliable (single-tenant band) and unreliable (multi-tenant band) servers. We show that the infinitesimal generator of the system has a block tridiagonal form. The results are illustrated numerically by estimating the average bit rate of viral videos, which varies due to aeronautical telemetry corresponding to the owner’s traffic.

Konstantin Samouylov, Irina Gudkova, Ekaterina Markova, Natalia Yarkina
Correlation Properties Comparative Analysis of Pseudorandom Binary Sequences and LTE Standard ZC Sequences

The paper describes correlation properties comparative analysis of pseudorandom binary sequences such as M-sequences, Gold codes, Hadamard ordered Golay sequences and LTE standard ZC sequences. In particular, the research considers primary synchronization signal (PSS) and random access preamble. Generation processes and the special features of ZC sequence based signals used in LTE standard are shown. Autocorrelation and cross correlation functions of appropriate signals are presented, correlation coefficients are evaluated.

Vladimir Lavrukhin, Vitaly Lazarev, Alexander Ryjkov
Busy Period Analysis of a Queueing System with Breakdowns and Its Application to Wireless Network Under Licensed Shared Access Regime

Licensed shared access (LSA) framework is becoming one of the promising trends for future 5G wireless networks. Two main parties are involved in the process of sharing the frequency band – the primarily user (owner) and the secondary user (licensee). From the LSA licensee’s perspective, who has access to the band when the owner does not need it, the band is unreliable and its customers (e.g. users of wireless network) suffer from possible service interruptions. This can only occur when there is at least one customer in service (i.e. in busy period). The aim of this paper is to estimate the impact of the LSA band unreliability to the LSA licensee within the period when some interruptions are possible. The metric is the relation between the number of service interruptions and the number of customers served during a busy period. We model the occupancy of the LSA band as a multi-server homogeneous queueing system with finite and infinite buffer size and deal with the busy period analysis. The system is analyzed in steady state by deriving expressions in terms of the Laplace-Stiltjes transforms for the continuous time distributions and in terms of the probability generating functions for the number of customers served during a busy period and number of failures which occur in a busy period. The non-monotonic nature of some probabilistic measures is identified. Some illustrative examples are added to the paper.

Dmitry Efrosinin, Konstantin Samouylov, Irina Gudkova
Evaluating a Case of Downlink Uplink Decoupling Using Queuing System with Random Requirements

The need for efficient resource utilization at the air interfaces in heterogeneous wireless systems has recently led to the concept of downlink and uplink decoupling (DUDe). Several studies have already reported the gains of using DUDe in static traffic conditions. In this paper we investigate performance of DUDe with stochastic session arrivals patterns in LTE environment with macro and micro base stations. Particularly, we use a queuing systems with random resource requirements and to calculate the session blocking probability and throughput of the system. Our results demonstrate that DUDe association approach allows to significantly improve the metrics of interest compared to conventional downlink-based association mechanism.

Eduard Sopin, Konstantin Samouylov, Olga Vikhrova, Roman Kovalchukov, Dmitri Moltchanov, Andrey Samuylov

NEW2AN: NoC and Positioning

Frontmatter
Intra-CPU Traffic Estimation and Implications on Networks-on-Chip Research

General purpose networks-on-chip (GP-NoC) are expected to feature tens or even hundreds of computational elements with complex communications infrastructure binding them into a connected network to achieve memory synchronization. The experience accumulated over the years in network design suggests that the knowledge of the traffic nature is mandatory for successful design of a networking technology. In this paper, based on the Intel CPU family, we describe traffic estimation techniques for modern multi-core GP-CPUs, discuss the traffic modeling procedure and highlight the implications of the traffic structure for GP-NoC research. The most important observation is that the traffic at internal interfaces appears to be random for external observer and has clearly identifiable batch structure.

Dmitri Moltchanov, Arkady Kluchev, Pavel Kustarev, Karolina Borunova, Alexey Platunov
Indoor Positioning in WiFi and NanoLOC Networks

In this paper we compare the indoor positioning techniques of RToF in nanoLOC and RSSI fingerprinting in WiFi networks experimentally and highlight the impact of orientation during primary measurement acquisition for increasing location accuracy in the case of NLOS and multipath signal propagation conditions. Resulting accuracy estimates confirm known results and reveal that radiomap construction with primary RSSI measurements in four angular directions can improve positioning accuracy by 0.5 m in comparison with traditional fingerprinting in deployed WiFi and location dedicated nanoLOC networks.

Mstislav Sivers, Grigoriy Fokin, Pavel Dmitriev, Artem Kireev, Dmitry Volgushev, Al-odhari Abdulwahab Hussein Ali

NEW2AN: ITS

Frontmatter
Pilot Zone of Urban Intelligent Transportation System Based on Heterogeneous Wireless Communication Network

The primary aim of Intelligent Transportation Systems (ITS) is to increase road safety as well as traffic efficiency. In order to meet strict and varying with ITS applications requirements, we propose using a combination of cellular, short range and Ultra High Frequency (UHF) communication technologies. Our approach was inspired by Communication access for Land Mobile (CALM). In this paper, we introduce, describe and discuss a distributed heterogeneous pilot ITS network. The technologies in focus are UHF communications for high reliability and robustness, Dedicated Short Range Communications (DSRC) for direct vehicular communications, WiMAX and LTE for broadband services. We describe the services that were chosen and how they map to the technologies. The characteristics of the technologies are translated into frequency-territorial planning, which derives the number of base stations and their locations. Finally, we show how the capabilities of the pilot network are demonstrated. This pilot network is a first step towards investigation of heterogeneous ITS in real urban communication surroundings.

Vladimir Grigoryev, Igor Khvorov, Yury Raspaev, Vladimir Aksenov, Anna Shchesniak
Connectivity of VANET Segments Using UAVs

The main topic of the researches is VANET (Vehicle Ad-hoc Network). VANET is a peer-to-peer network based on IEEE 802.11p standards and group standards IEEE 1609 Wireless Access in Vehicular Environments (WAVE). Another current line of research is the UAVs. In 2015, the scientific works, oriented to research of a possibility of UAVs use for the VANET networks, began to appear. The scientific works present issues concerning connection of separately located network nodes by means of UAVs.In this paper, we suggest evaluation of the possibility of creating flying VANET nodes. We will consider the model of the communication network of several isolated vehicles’ segments using UAVs. We will carry out the modelling and calculations in order to determine the maximum number of segments that can service the node based on UAVs for several types of call flows and describe circuit of preparation and statistical data production in the context of real network segment.

Pavel Shilin, Ruslan Kirichek, Alexander Paramonov, Andrey Koucheryavy

NEW2AN: Network Issues

Frontmatter
The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring

The wireless network of low-power devices of Smart home and Internet of Things is considered. The signs of unauthorized access are defined. The analysis of the characteristics of systems based on wireless technologies obtained from the experiment results of passive monitoring and active polling of device forming the network infrastructure is conducted. The state-analyzing model based on the identity, quantity, frequency and temporal characteristics is presented. Evaluation of the information security state is focused on analyzing of the system normal functioning profile excluding the search of signatures and characteristics of anomalies under different kinds of attacks. The accumulation of data for decision-making is carried out by comparison of the statistical information of service message from the terminal nodes in passive and active modes. The proposed model can be used to determine the technical characteristics of the devices of wireless ad-hoc networks and to make recommendations concerning the information security state analysis.

Ilya Lebedev, Irina Krivtsova, Viktoria Korzhuk, Nurzhan Bazhayev, Mikhail Sukhoparov, Sergey Pecherkin, Kseniya Salakhutdinova
Improving the Efficiency of Architectural Solutions Based on Cloud Services Integration

Recently, many Russian companies are trying to transform their businesses through new Internet services to increase productivity, reduce costs, minimize risks and extend the capabilities of the enterprise. Increasingly such problems are solved with the help of media access to a variety of cloud-based services. The key features of such services are self-service on-demand, broadband network access, resource pooling in the pools, instant flexibility, measurability of the services provided. The acquisition of cloud solutions for enterprise becomes profitable alternative to their own IT infrastructure as cloud can save money for the hardware purchase and support. Cloud solutions help to adjust the amount of resources used in real-time, paying only for actual power consumed. In addition, this approach allows you to streamline business processes within the company, since most of the issues relating to IT, outsourced to an external provider. The paper investigates the possibilities to increase the efficiency of architectural solutions of IP-telephony company sphere by improving the quality of services sold. This paper analyzes the existing methods of valuation services. Method of assessing the call-centers efficiency has been selected. This method is based on the approved KPI business processes. The possibilities of the call-center optimization and improvements of KPI business processes by increasing the level of Software as a Services (SaaS). The main criteria of successful work of call-centers have been described in the paper, to explore the market of existing cloud-based solutions, to assess the possibility of introducing cloud services in architectural solution and to estimate the obtained figures.

Vladimir V. Glukhov, Igor V. Ilin, Oxana Ju. Iliashenko
Optimization of Selection Strategies for P2P Streaming Network Based on Daily Users’ Behavior and Users’ Distribution over Time Zones

In this paper, an optimization problem of selection strategies for peer-to-peer (P2P) live streaming network is discussed. To solve the problem, the simulation model of P2P live streaming network is developed. The model considers daily peers behavior, their distribution over time zones, collisions, time lags between the server and a peer, lags between peers, and three types of selection strategies: neighbor selection strategy, peer selection strategy, and chunk selection strategy. Daily peers’ behavior is defined as the distribution of the number of online users by the time of day. Initial data for the peers distribution over time zones and their daily behavior are taken from the known Internet sources. The aim of the research is to find an appropriate solution of the proposed optimization problem and to show how the choice of a certain set of selection strategies affects the key characteristics of P2P streaming networks. The results of the conducted numerical analysis show the increase of the network performance up to 16,25 %.

Yuliya Gaidamaka, Ivan Vasiliev

NEW2AN: SDN

Frontmatter
Comprehensive SDN Testing Based on Model Network

Software-defined networking (SDN) can significantly automate and facilitate network management by allowing their programming. In this paper we show the SDN concept, method of testing, and the main characteristics of the SDN controller. The study based on the model network in the laboratory high-speed backbone networks DWDM and programmable networks SUT. The paper presents results of a collaborative functioning of SDN and DWDM-network. In this paper we created graphical interface over Cbench and added several advanced features in C++, also conducted stress testing SDN controllers.

Andrei Vladyko, Ammar Muthanna, Ruslan Kirichek
Increasing the Efficiency of IPTV by Using Software-Defined Networks

The problem of control and routing of broadband multimedia traffic has been considered in this paper. We suggest SDN-based network infrastructure for IPTV. Within the infrastructure IGMP and PIM are replaced by our OpenFlow-based protocol. To control multicast quality, we also propose real-time selective marking of IP packets by means of unique tags on input device, so monitoring respective stream quality and correcting it if necessary. A simulation model of broadband multimedia multicasting infrastructure based on SDN has been developed. The infrastructure performance has been studied on OMNET++ simulator. The experiment shows a growth of switch performance up to twice as much when the OpenFlow is used for processing multicast streams.

Yuri Ushakov, Petr Polezhaev, Leonid Legashev, Irina Bolodurina, Alexander Shukhman, Nadezhda Bakhareva
Fuzzy Model of Dynamic Traffic Management in Software-Defined Mobile Networks

Nowadays, in mobile networks, latency-sensitive services may compete for the bandwidth of other services, thus degrading overall performance. Software-defined mobile networks opening many new possibilities for dynamic traffic management. This gives chances to ensure strict requirements of the service quality in changing conditions. We considered two requirements for the quality of service: bandwidth and latency. Providing the required bandwidth is relatively simple compared to the end-to-end delay, as its guarantee requires a complex model that takes into account the mutual influence of flows throughout the entire path. Our model includes the following metrics: maximum channel utilization, traffic priority, the number of “hops”. Fuzzy balancer module has been developed for the Floodlight controller in Java. This module calculates the weights of the links in accordance with the proposed method. Simulation network was held in Mininet environment. During the experimental implementation, it has been shown that simple algorithm based on mathematical apparatus of fuzzy logic allows dynamically adapting the network to the change of the traffic volume, as well as its structure.

Andrei Vladyko, Ivan Letenko, Anton Lezhepekov, Mikhail Buinevich

NEW2AN: Satellite Communications

Frontmatter
GNSS Attitude Determination Based on Antenna Array Space-Time Signal Processing

This paper presents Global Navigation Satellite Systems (GNSS) attitude determination approach based on solution of direction-finding (DF) problem. The carrier phase GNSS concept is used to achieve precise attitude parameters (pitch, roll and yaw angles). This approach consists in maximization of resulting functions constructed on different combinations of R-functions. Effective attitude parameters estimations are maximum likelihood estimations. Well known algorithms (least-square, QUEST, etc.) of likelihood function maximization are computationally complicated. Besides these algorithms, reference phase differences can be used to maximize likelihood function. Reference phase differences are easily implemented and have advantages in computing costs. Angles accuracy is higher, when presented approach compared to ML, when reference phase differences are used in both cases. DF concept for attitude determination is discussed in this paper. Two different modifications of resulting function using for attitude determination are considered. Efficiency of described methods is expressed in terms of angles accuracy and abnormal error rate.

Igor Tsikin, Elizaveta Shcherbinina
Angle-of-Arrival GPS Integrity Monitoring Insensitive to Satellite Constellation Geometry

Signals in global navigation satellite systems (GNSS) due to weak power are vulnerable to structural interferences which can lead to a significant deviation of the position solution from its true value. In aviation, UAV-controlling or some another life critical applications misleading coordinate information is a great threat so that procedures to detect such GNSS integrity failure are under a big concern. This paper is focused on decision-making algorithm for the failure detection applied to Angle-of-Arrival (A-o-A) integrity monitoring method in a case when the fixed decision threshold is preset in accordance with false alarm probability restricted for all possible observing satellite constellations. Decision threshold value was obtained for a different number of satellites by statistical simulations for quite a number of randomly generated satellite constellations with suitable geometric dilution of precision (GDOP) level. Minimum number of navigation signals was estimated for the situation when the simplest three elements antenna array implemented on compact UAV is used for a direction-finding procedure. As a result A-o-A integrity monitoring efficiency was estimated for real GPS satellite constellation under conditions when decision threshold was fixed as insensitive to satellite constellation geometry.

Igor Tsikin, Antonina Melikhova

NEW2AN: Signals and Circuits

Frontmatter
Investigation of Questions of Non-harmonic Signal Scattering on Impedance Structures

On the basis of diffraction problem known solutions on a wedge in the case of harmonic effects using frequency method was analyzed the UWB pulse scattering on the impedance wedge. The features of the diffraction different kinds of pulses were revealed. We were defined the influence of the wedge’s electrical and geometrical parameters, sensing conditions and monitoring, as well as probing signal spectrum shape and the diffraction pulse energy. In study of the time dependence influence the type of probe pulse on the scattering field was tested a time-frequency method.

Alexander F. Kryachko, Mikhail A. Kryachko, Kirill V. Antonov, Yakov Y. Levin, Igor E. Tyurin
Joint Use of SEFDM-Signals and FEC Schemes

The combination of multicarrier signals with nonorthogonal frequency spacing (spectrally efficient frequency division multiplexing, SEFDM) and forward error correction (FEC) schemes is analyzed for LTE convolutional and turbo codes. BER performance of coded and uncoded OFDM and SEFDM is considered while keeping the spectral efficiency constant. Also puncturing patterns are selected for providing different code rates of the LTE turbo-code encoder with very small step size. It is shown that compared with uncoded OFDM the best value of SEFDM compression factor providing better BER performance can be found. But for coded OFDM coded SEFDM always performs worse due to waterfall behaviour of BER curves, thus restricting the application borders of SEFDM.

Dmitry Vasilyev, Andrey Rashich, Dmitrii Fadeev
Possibilities of “Nyquist Barrier” Breaking by Optimal Signal Selection

A possibility of overcoming the “Nyquist barrier” by finding the optimal waveform for a binary signal is investigated. The same BER performance as of BPSK signals is required. This problem can be viewed as an optimization problem. Parameters to be optimized are the rate of decay with frequency of out-of-band emissions, duration of signals and BER performance. BER performance is determined by a cross-correlation coefficient. Solutions to the optimization problem are obtained numerically. These solutions have the form of the coefficients of the truncated Fourier series of the waveforms obtained under different restrictions. Corresponding power spectra are analyzed. It is shown that the doubling of data rate leads to 30 % increase in bandwidth. Spectral efficiency can be increased by the use of longer signals. But the increase in signals duration leads to the increase of peak-to-average ratio of random sequence of signals. At the same time BER performance degrade insignificantly. Additional energy losses are no more than 0.5 dB.

Sergey V. Zavjalov, Sergey B. Makarov, Sergey V. Volvenko, Shen De Yuan
Reduction of Energy Losses Under Conditions of Overcoming “Nyquist Barrier” by Optimal Signal Selection

A problem of overcoming “Nyquist barrier” for single-frequency signals minimum energy losses is discussed. Main constrains for this optimization problem are the rate of decay of out-of-band emissions and BER performance. BER performance is determined by the cross-correlation coefficient. The optimization problem is solved numerically. The solutions of optimization problem with different constraints give the envelopes of optimal signals. The simulation showed that energy losses can be significantly reduced by using the optimal signals. Additional energy losses for the doubled data rate are no more than 0.5 dB. In contrast the use of the Nyquist signals in the same conditions leads to BER performance degradation up to 8 dB for 20 % data rate increase.

Sergey V. Zavjalov, Sergey B. Makarov, Sergey V. Volvenko
Root-Raised Cosine versus Optimal Finite Pulses for Faster-than-Nyquist Generation

In the paper we compare two approaches of intentional introduction of inter-symbol interference (ISI) into single-carrier signal to improve its bandwidth efficiency. The first approach is “faster-than-Nyquist” signaling (FTN) with infinite rrc-pulses. The second approach is generation of multicomponent signals (MCS) utilizing optimal finite pulses. In the optimization problem, we used a criterion of minimal bandwidth comprising 99 % of signal power. The maximal level of ISI and peak-to-average power ratio were used as additional constraints. The comparison of optimal MCS and FTN is given in the bandwidth and energy consumptions plane for the fixed computational complexity of the receiver. In addition, we considered modified energy consumptions taking values of PAPR into account. It is shown that optimal MCS provide lower consumptions with respect to FTN with rrc-pulses.

Anton Gorlov, Aleksandr Gelgor, Van Phe Nguyen
Optimal Input Power Backoff of a Nonlinear Power Amplifier for FFT-Based Trellis Receiver for SEFDM Signals

In this paper BER performance of FFT-based trellis receiver for multicarrier signals with spectrally efficient frequency division multiplexing (SEFDM) is evaluated taking into account the impact of nonlinear distortions caused by nonlinear power amplifier (PA). Values of input power back-off (IBO) corresponding to the best BER performance are obtained. The energy efficiency is quantified with energy loss with respect to the system with ideal linear PA. The energy efficiency of considered system is compared with the one of SEFDM system with detection algorithm based on decision diagram and no coding.

Andrey Rashich, Dmitrii Fadeev
The Allan Variance Usage for Stability Characterization of Weak Signal Receivers

The paper is devoted to the Allan variance usage for output signal fluctuation analysis of weak signal receivers. The tri-band microwave receiving system for the new radio telescope RT-13 of Institute of Applied Astronomy of Russian Academy of Sciences is considered. The Allan variance correction for signals with «dead time» in data acquisition is developed. Output stability of the receiver is investigated in terms of noise fluctuation type – white, flicker, drift, etc., and their time stability intervals calculation. Investigations are performed in S-, X-, and Ka- receiver bands. The influence of the input cryogenic stage temperature on output receiver signal is considered also.

Yuriy V. Vekshin, Alexander P. Lavrov
An Extremely Flexible, Energy, and Spectral Effective Green PHY-MAC for Profitable Ubiquitous Rural and Remote 5G/B5GIoT/M2M Communications

In this paper, the fundamental PHY-MAC throughput limits and extremum of the energy, power, spectral efficiency invariant criteria are proved. The invariant criteria are constructed relying on Shannon’s m-ary digital channel capacity which a rich palette of the technically interpreted PHY-MACs parameters consider. Therefore, the invariant criteria as very suitable for research and design of an 5G extremely performance problems are found. The PHY-MACs smart distributed control techniques which able implements “on-the-fly” the limits close and invariant criterion optimization or trade-off is proposed. Such PHY-MAC’s smart control techniques represent a key disruptive technologies meet the 5G/B5G network challenges.

Alexander Markhasin
Application of Microwave Photonics Components for Ultrawideband Antenna Array Beamforming

We consider beamforming arrangement for ultrawideband antenna array that can currently provide the required true time delay capabilities by using the units and elements available at the market of modern components of fiber-optical telecommunication systems. The essential parameters of accessible analog microwave photonic link’s main components as well as performance characteristics of the complete photonic link assembly have been measured. The beamformer scheme based on true-time-delay technique, DWDM technology and fiber chromatic dispersion has been designed. The developed and tentatively investigated beamformer model is mainly composed of commercial microwave photonic components. The results of beamformer model experimental testing jointly with the wideband linear antenna array in 6–15 GHz frequency range show no squint effect while steering the antenna pattern and good accordance with the calculation estimates.

S. I. Ivanov, A. P. Lavrov, I. I. Saenko
Study of Specific Features of Laser Radiation Scattering by Aggregates of Nanoparticles in Ferrofluids Used for Optoelectronic Communication Systems

Ferromagnetic fluids are considered to be advanced materials both for the fundamental research and for possible applications, among which some integrated optic devices with the elements containing ferrofluids and controlled by an external magnetic field have recently been discussed. This work is devoted to the experimental study of the factors affecting the intensity and spatial distribution of the laser radiation scattered by the particle structures in ferrofluids in a zero magnetic field and in the presence of magnetic field with H = 1000 Oe. The samples of nanodispersed magnetite (Fe3O4) suspended in kerosene and in water were studied. Certain trends determining the scattering patterns were observed.

Andrey Prokofiev, Elina Nepomnyashchaya, Ivan Pleshakov, Yurii Kuzmin, Elena Velichko, Evgenii Aksenov
Acousto-Optic Switch Based on Scanned Acoustic Field

A laboratory model of an acousto-optic switch in a combined implementation was created and investigated. The output optical elements and input fibers were implemented by using the space-wired interconnection, and the acousto-optic interaction took place in a planar waveguide. The operating abilities of the model and the possibility to build real devices are demonstrated.

Alina Galichina, Elena Velichko, Evgeni Aksenov

NEW2AN: Advanced Materials and Their Properties

Frontmatter
Quantum Field Theoretical Approach to the Electrical Conductivity of Graphene

The longitudinal and transverse electrical conductivities of graphene are calculated at both zero and nonzero temperature starting from the first principles of thermal quantum field theory using the polarization tensor in (2+1)-dimensional space-time. An expression for the universal conductivity of graphene found previously using different phenomenological approaches is confirmed. Both exact and approximate asymptotic expressions for the real and imaginary parts of the conductivity of graphene are derived and compared with the results of numerical computations. The obtained results can be used in numerous applications of graphene, such as in optical detectors, transparent electrodes and nanocommunications.

Galina L. Klimchitskaya, Vladimir M. Mostepanenko, Viktor M. Petrov
Writing Ferroelectric Nanodomains in PZT Thin Film at Low Temperatures

Thin ferroelectric films are prospective materials for applications in the area of tunable microwave electronics as a base for varactors, phase shifters, delay lines, tunable filters and antennas. The most important technological aspect of using thin polar films in electronics is a possibility of miniaturization. By means of piezoresponse force microscopy technique, it is possible to create nanometer-sized areas (or ferroelectric domains) in thin films with preferable direction of polarization. Besides the fact that these domains could be used as a bit for mass storage application, it was found, that domain walls have their own properties, moreover, they are mobile. This circumstance could give rise to a new type of technology where mobile domain walls will be the “active ingredient” of the device.In this work, we use a scanning piezoresponse force microscopy to investigate the process of writing and growth of ferroelectric domains in thin PbZr0.3Ti0.7O3 film in a broad temperature range. It was found that even at 4.2 K nanoscale ferroelectric domains could be writing by application of short voltage pulses between the tip of atomic force microscope and extended bottom electrode. Based on the obtained experimental results the mechanism driven the ferroelectric domain dynamics in thin films at low temperatures was determined.

Alexandr Vakulenko, Natalia Andreeva, Sergej Vakhrushev, Alexandr Fotiadi, Alexey Filimonov
Principles of Constructive Synthesis of Electromagnetic Wave Radiators

This paper presents the results of the generalization of the problems of the constructive synthesis (CS) and finding of factors influencing the bandwidth of synthesized small electrical size radiators. Definitions of various types of synthesis problems are collected, the definition of the CS is given and tasks of the CS of wideband radiators are defined. The paper includes a thorough analysis of small size wideband antennas of various types, discusses the causes of the bandwidth increase that are mainly due to the use of special techniques influencing the bandwidth. Potential capabilities of minimization of dimensions of various types of radiators are shown. Various methods of synthesis are compared using real world problems as examples. Main differences of the CS from parametric and structural-parametric synthesis are given. Strong and weak points of methods proposed by various authors are shown.

Roman U. Borodulin, Boris V. Sosunov, Sergey B. Makarov
Investigation of Electro-Physical and Transient Parameters of Energy Accumulating Capacitors Applied in Nanosecond and Sub-nanosecond High-Current Avalanche Switches

Peak power of nanosecond and sub-nanosecond high-power pulsed optical transmitters was found to be drastically affected not only by the speed of the avalanche switch, but also by structure and geometry of the capacitive energy accumulator, and assembly construction. Together with trivial effect of parasitic inductance of the entire switching loop, it was found that some capacitors, even those designed for microwave use, are unable to release the charge in sub-nanosecond time scale when large signal operation (high current) is required. The problem was successfully solved using specially developed surface-mounted capacitors utilizing high-quality silicon nitride using plasma-deposition method. Finally miniature capacitors permitting direct assembling with avalanche transistor chips and laser diode with minimum possible (~1 nH) parasitic inductance withstand up to 600 V and allow nanosecond 20–30 A current pulse generation and optical pulses exceeding 30 W.

V. E. Zemlyakov, V. I. Egorkin, S. N. Vainshtein, A. V. Maslevtsov, Alexey Filimonov

NEW2AN: Economics and Business

Frontmatter
Evaluating the Efficiency of Investments in Mobile Telecommunication Systems Development

The paper gives insight into the importance of economic evaluation of investments in Russian telecommunication companies. Qualitative case studies are based on scenario approach with risk analysis. The results include: risk classification of telecommunication companies in Russia, quantitative risk assessment; non-systematic risk premium assessment for mobile telecommunication services in Russia; quantitative evaluation of the major indicators of investment efficiency for telecommunication services.

Tatyana Nekrasova, Valery Leventsov, Ekaterina Axionova
Development of Project Risk Rating for Telecommunication Company

We developed the project risk rating (PRR) for telecommunication companies. It provides qualitative risk scores assessment of capital expenditures (capex) projects to rank them by severity of exposures, to check their fit into the company’s risk profile and, ultimately, to combine projects into the efficient project portfolio with the lowest risk given return. We discussed the definition, functions and advantages of investment controlling and presented the reference model of its main subsystem – project portfolio controlling responsible for building the efficient capex project portfolio. Then, we developed the model of PRR; worked out the example of PRR’s scorecard and discussed the advantages of the PRR over the existing risk assessment tools in project portfolio management.

Sergei Grishunin, Svetlana Suloeva
Innovation Venture Financing Projects in Information Technology

The article deals with crucial issues of innovation venture financing of in the field of information technologies in Russian Federation. The classification of main types of business venture developed, depending on the financial resources attraction. Compiled and analyzed scheme of small innovative companies in terms of passing the stages of investment in the company. The method of “buy-back” cost calculation of the company financed by venture funds is presented. Special transmitter-receiver modules production startup at the enterprise, working in the field of IT-technologies is introduced as an example of economic indicators calculation and monitoring.

Alexander Bril, Olga Kalinina, Olga Valebnikova
Information Risk Analysis for Logistics Systems

The algorithm for calculation of the information risk is suggested. The algorithm takes into account the flows of all the components of the transportation system, the quality of their interaction, restrictions, and probability distribution. By using this algorithm the logistics company or intelligent transportation system gets the data on the assessment of the information risks, which helps the decision maker to decide whether it is reasonable to conclude the contract or not.

Elena Velichko, Constantine Korikov, Anatoliy Korobeynikov, Aleksey Grishentsev, Mihail Fedosovsky
Backmatter
Metadata
Title
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Editors
Olga Galinina
Sergey Balandin
Yevgeni Koucheryavy
Copyright Year
2016
Electronic ISBN
978-3-319-46301-8
Print ISBN
978-3-319-46300-1
DOI
https://doi.org/10.1007/978-3-319-46301-8

Premium Partner