Skip to main content
Top

2017 | Book

Internet of Things, Smart Spaces, and Next Generation Networks and Systems

17th International Conference, NEW2AN 2017, 10th Conference, ruSMART 2017, Third Workshop NsCC 2017, St. Petersburg, Russia, August 28–30, 2017, Proceedings

insite
SEARCH

About this book

This book constitutes the joint refereed proceedings of the 17th International Conference on Next Generation Wired/Wireless Advanced Networks and Systems, NEW2AN 2017, the 10th Conference on Internet of Things and Smart Spaces, ruSMART 2017.

The 71 revised full papers presented were carefully reviewed and selected from 202 submissions. The papers of NEW2AN focus on advanced wireless networking and applications; lower-layer communication enablers; novel and innovative approaches to performance and efficiency analysis of ad-hoc and machine-type systems; employed game-theoretical formulations, Markov chain models, and advanced queuing theory; grapheme and other emerging material, photonics and optics; generation and processing of signals; and business aspects. The ruSMART papers deal with fully-customized applications and services. The NsCC Workshop papers capture the current state-of-the-art in the field of molecular a

nd

nanoscale communications such as information, communication and network theoretical analysis of molecular and nanonetwork, mobility in molecular and nanonetworks; novel and practical communication protocols; routing schemes and architectures; design/engineering/evaluation of molecular and nonoscale communication systems; potential applications and interconnections to the Internet (e.g. the Internet of Nano Things).

Table of Contents

Frontmatter

New Generation of Smart Services (ruSMART 2017)

Frontmatter
Developing of Emerging Internet Applications for Home Healthcare

The system of collection, transmission and processing of data for wearable sensors for personal health care using the heart rate monitoring, skin temperature and electrophotonic imaging (EIP) sensors is described. EPI instrument based on the stimulation of photon and electron emissions from the surface of the object is used. The paper describes the interaction of the system components, the methods and hardware implementation of data transfer, information about computer software for working with database servers and client terminals as well as components of a remote patient monitoring system based on cloud architecture. Examples of information presented to the patients and doctors are presented.

Konstantin G. Korotkov, Konstantin P. Semenov, Victor I. Malyugin, Dmitry V. Kiesewetter
Digital Business Model and SMART Economy Sectoral Development Trajectories Substantiation

Tendencies and perspectives of sectoral development in SMART economy have been shown. Digitalization and IoT development levels have been given. The necessity of precedence development in sectors that create a base for telecommunications industry has been substantiated. Original schema of substantiation of sectoral development trajectories in SMART economy based on identification of gaps between current and required levels of sectoral development and the usage of complex of transformable business models as a tool for overcoming this gaps have been proposed. The analysis of current state of electronic components manufacturing industry in Republic Bashkortostan has been conducted; low level of compliance with the requirements of SMART economy and sectoral target indexes has been identified. The digital business model of electronic components manufacturing industry development oriented on creation of integrated production manufacturers maintaining all stages of creation, production, selling the product (Integrated Device Manufacturers, IDM), and realizing as virtual integrator technology (VIDM) has been formed. The matrix of sectoral development substantiation in SMART economy based on criteria of production-technological and market readiness and digitalization levels has been built. Three basic trajectories of sectoral development (vertical, horizontal and mixed) based on different schemas of transformations of business models depending on available resources and government support level have been identified.

L. A. Ismagilova, T. A. Gileva, M. P. Galimova, V. V. Glukhov
Ontology Matching for Socio-Cyberphysical Systems: An Approach Based on Background Knowledge

Nowadays there are exist many ontology matching methods mostly based on using context and content in various combinations. The accuracy of existing methods can be increased by using the background knowledge – an external reference knowledge that can facilitate the matching process. The paper proposes an approach for automated matching of elements (fragments) of the ontologies based on the combination of existed ontology matching methods (pattern and context-based), neural network matching and additional control by community-driven matching. All of them are using the background knowledge to get additional information that helps to find more precise correspondence between ontologies concepts. Also, the background knowledge helps to explain result of ontology matching to the user, which is going to check the correspondence manually. In addition, the paper proposes an architecture of ontology matching service that is built based on the presented approach. The service is used for providing semantic interoperability in socio-cyberphysical systems.

Alexander Smirnov, Nikolay Teslya, Sergey Savosin, Nikolay Shilov
Battery Monitoring Within Industry 4.0 Landscape: Solution as a Service (SaaS) for Industrial Power Unit Systems

The current globalization already faces the challenge of meeting the continuously growing demand for new consumer goods by simultaneously ensuring a sustainable evolution of human existence. The industrial value creation must be geared towards sustainability. In order to overcome this challenge, tightly coupling the production and its axiomatization processes is required in the paradigm of Industry 4.0. This technology bridges together a vast amount of new interconnected smart devices being mostly battery powered. Batteries are the heart of industrial motive power and electric energy storing solutions in the infrastructures of today. The charges related to the batteries are among the biggest cost (2.000–5.000 EUR per unit). Unfortunately, the batteries are not always treated properly and the badly managed ones lose their ability to store energy quickly. In this work, we present the developed modular Cloud solution utilizing Solution as a Service (SaaS) to monitor and manage industrial power unit systems. Modular approach is realized using simple miniature non-intrusive wireless sensors combined with cloud platform that provides the battery intelligence.

Mathieu Devos, Pavel Masek
Opportunistic Data Collection for IoT-Based Indoor Air Quality Monitoring

Opportunistic sensing advance methods of IoT data collection using the mobility of data mules, the proximity of transmitting sensor devices and cost efficiency to decide when, where, how and at what cost collect IoT data and deliver it to a sink. This paper proposes, develops, implements and evaluates the algorithm called CollMule which builds on and extends the 3D kNN approach to discover, negotiate, collect and deliver the sensed data in an energy- and cost-efficient manner. The developed CollMule software prototype uses Android platform to handle indoor air quality data from heterogeneous IoT devices. The CollMule evaluation is based on performing rate, power consumption and CPU usage of single algorithm cycle. The outcomes of these experiments prove the feasibility of CollMule use on mobile smart devices.

Aigerim Zhalgasbekova, Arkady Zaslavsky, Saguna Saguna, Karan Mitra, Prem Prakash Jayaraman
The IoT Identification Procedure Based on the Degraded Flash Memory Sector

The article presents general principles of IoT identification on the basis of the degraded bucket of NOR flash memory used in network devices for storing microprograms. We proposed the identification procedure based on the sector of forcibly degraded flash memory and considered variants of its application for identifying network devices. The proposed identification method can be used both on the basis of chips already existing in network devices and on the basis of embedded units specially designed for identification.

Sergey Vladimirov, Ruslan Kirichek
DisCPAQ: Distributed Context Acquisition and Reasoning for Personalized Indoor Air Quality Monitoring in IoT-Based Systems

The rapidly emerging Internet of Things supports many diverse applications including environmental monitoring. Air quality, both indoors and outdoors, proved to be a significant comfort and health factor for people. This paper proposes a smart context-aware system for indoor air quality monitoring and prediction called DisCPAQ. The system uses data streams from air quality measurement sensors to provide real-time personalised air quality service to users through a mobile app. The proposed system is agnostic to sensor infrastructure. The paper proposes a context model based on Context Spaces Theory, presents the architecture of the system and identifies challenges in developing large scale IoT applications. DisCPAQ implementation, evaluation and lessons learned are all discussed in the paper.

Tamara Belyakhina, Arkady Zaslavsky, Karan Mitra, Saguna Saguna, Prem Prakash Jayaraman
Cloud Computing Solution for Investment Efficiency Measurement in Biomedicine

Cloud computing is being widely adopted in various scientific areas, solutions and applications not including the biomedical research. This scientific area is characterized by the need of large amounts of data processing and these requirements are ensured by the cloud computing solutions. Cloud computing might bring many benefits, such as cost savings, elasticity and scalability of using ICT. On the other hand, the implementation might be inefficient and cost intensive. The measurement of cloud computing benefits and its efficiency is considered to be one of the crucial point for successful implementation of new systems or applications. The goal of this paper is to present specialized application for cloud computing investment efficiency with a respect to specificities of biomedical research area.

Petra Maresova, Vladimir Sobeslav
Time Series Distributed Analysis in IoT with ETL and Data Mining Technologies

The paper describes an approach to performing a distributed analysis on time series. The approach suggests to integrate Data Mining and ETL technologies and to perform primary analysis of time series based on a subset of data sources (primary data sources). Other data sources are only used if it is necessary to obtain additional information. This allows to reduce the number of requests to data sources and network traffic. In the result it makes it possible to use communication channels with low bandwidth (including wireless networks) for data collection.

Ivan Kholod, Maria Efimova, Andrey Rukavitsyn, Shorov Andrey
Exploring SDN to Deploy Flexible Sampling-Based Network Monitoring

In recent years we witnessed the arrival of new trends, such as server virtualization and cloud services, an increasing number of mobile devices and online contents, leading the networking industry to deliberate about how traditional network architectures can be adapted or even deciding if a new perspective for them should be taken. SDN (Software-Defined Networking) emerged under this framing, opening a road for new developments due to the centralized logic control and view of the network, the decoupling of data and control planes, and the abstraction of the underlying network infrastructure from the applications. Although firstly oriented to packet switching, network measurements have also emerged as one promising field for SDN, as its flexibility enables programmable measurements, allowing a SDN controller to manage measurement tasks concurrently at multiple spatial and temporal scales.In this context, this paper is focused on exploring the SDN architecture and components for supporting the flexible selection and configuration of network monitoring tasks that rely on the use of traffic sampling. The aim is to take advantage of the integrated view of SDN controllers to apply and configure appropriate sampling techniques in network measurement points according to the requirements of specific measurement tasks. Through SDN, flexible and service-oriented configuration of network monitoring can be achieved, allowing also to improve the trade-off between accuracy and overhead of the monitoring process. In this way, this study, examining relevant SDN elements and solutions for deploying this monitoring paradigm, provides useful insights to enhance the programmability and efficiency of sampling-based network monitoring.

Catarina Pires da Silva, Solange Rito Lima, João Marco Silva
VNF Orchestration and Modeling with ETSI MANO Compliant Frameworks

The goal of this paper is to compare existing NFV (Network Function Virtualization) management solutions and propose SaltStack based solution with the same goal. Modern approach to govern NFV automation in large scale IT infrastructures is done by virtualization of various network services. Hardware networking devices are gradually replaced by virtual network appliances for the lower acquisition and maintenance costs. Vendors virtualize their physical products so they can be used along or within cloud environments. The ETSI (European Telecommunications Standards Institute) standard MANO (NFV Management and Organization) aims to unify the management of physical and virtual network services and devices to single point of control for configuration and management.The paper covers the major NFV frameworks that use MANO as their reference architecture with focus on underlying interface technologies. The main focus of the paper is NFV-MANO orchestration engine using SaltStack capabilities that can model and manage heterogeneous NFV and NFVI resources according to the ETSI NFV-MANO specification along software resources already present. This gives us unique ability to cover all data center resources, both hardware or software based in a single model.

Ales Komarek, Jakub Pavlik, Lubos Mercl, Vladimir Sobeslav
Performance Evaluation of OpenFlow Enabled Commodity and Raspberry pi Wireless Routers

Software defined network (SDN) allows the decoupling of data and control plane for dynamic and scalable network management. SDN is usually associated with OpenFlow protocol which is a standard interface that enables the network controllers to determine the path of network packets across a network of switches. In this paper, we evaluate openflow performance using commodity wireless router and raspberry pi with two different SDN controllers. Our test setup consists of wired and wireless client devices connected to openflow enabled commodity wireless router and raspberry pi. All clients used traffic generator tool to transmits data to a sink server host. The results are promising and paves the way for further research on using software defined wireless network.

Muhammad Zeeshan Asghar, M. Ahsan Habib, Timo Hämäläinen
Design Issues of Information and Communication Systems for New Generation Industrial Enterprises

Intensive development of technologies for information processing and transfer is the basis for creation of cutting-edge production systems in the context of “Industry 4.0”. Implementation of this concept will ensure efficient development of the national production industry. The paper looks into the issues of organizational and technical engineering of such types of systems and focuses on reasoning the movement and conversion characteristics of information flows. Based on literature review a generalized structure is proposed for the info-communication systems of a production unit. The main requirements for this system and its major structural elements, which are laid down at the design stage, are formulated. The content of the design problems of the info-communication system has been proposed in the context of its structural elements. Main solution methods have been worked out to solve individual groups of problems.

Valery Leventsov, Anton Radaev, Nikolay Nikolaevskiy
SWM-PnR: Ontology-Based Context-Driven Knowledge Representation for IoT-Enabled Waste Management

Using knowledge-based and semantic technologies in IoT is a very active research and promising area. This paper proposes a method of ontology-based context-driven knowledge representation for IoT-enabled hard waste management as part of a wider international project that aims at building IoT ecosystems for smart cities. The paper presents the development of the waste management ontology, rules, and proposes a multistage data processing method that allows extracting knowledge about specific nontrivial situations on its basis. The paper describes implementation of the proposed system as a web application, where the content types are based on ontology, and data processing occurs according to the proposed algorithm. Benefits of the proposed knowledge-based system are discussed and demonstrated. The proposed approach will significantly improve monitoring and management of waste collection, route planning, and problem reporting.

Inna Sosunova, Arkady Zaslavsky, Theodoros Anagnostopoulos, Petr Fedchenkov, Oleg Sadov, Alexey Medvedev
Supporting Data Communications in IoT-Enabled Waste Management

The Internet of Things (IoT) enables Smart Cities with novel services. Such services demand low power, high throughput and low-cost sensor data collection technologies. The number of devices, their variety, the breadth of their distribution, and the number of standards are continuously increasing. In this paper, we explore and critically analyze emerging IoT communication technologies. LoRaWAN has been selected for deployment in the smart waste management system (SWM) for collecting data from smart garbage bins. The paper proposes an architecture for SWM data collection and delivery as part of St. Petersburg pilot of Horizon-2020 bIoTope project. Extensive experiments with actual sensors and smart garbage bins were conducted for stress-testing the LoRaWAN technology, analyzing data rates and power consumption. The paper concludes with lessons learned and LoRaWAN wider deployment feasibility and improvements discussion.

Petr Fedchenkov, Arkady Zaslavsky, Alexey Medvedev, Theodoros Anagnostopoulos, Inna Sosunova, Oleg Sadov

International Workshop on Nano-Scale Computing and Communications (NsCC 2017)

Frontmatter
Fiber-Optic Transmission System for the Testing of Active Phased Antenna Arrays in an Anechoic Chamber

The results of the research of the developed fiber-optic transmission systems for analog high frequency signal are represented. On its basis, a new method to identify various structural defects in the active phased antenna arrays is elaborated.

Roman V. Davydov, Ivan K. Saveleiv, Vladimir A. Lenets, Margarita Yu. Tarasenko, Tatiana R. Yalunina, Vadim V. Davydov, Vasily Yu. Rud’
Advanced Materials for Fiber Communication Systems

Fluoroaluminate glass is a material with a number of unique properties, but at present there are no studies that relate the chemical composition and luminescence properties. A number of fluoroaluminate glasses based on the composition (100 − x)·MgCaSrBaYAl2F14 − x·Ba (PO3)2, where x = (0.5–3.0) mol.% were synthesized by melting technique. The tendency of concentration dependence of hydroxyl absorption peaks reduction was explained by analysis of complex IR transmittance spectra and molecular refraction. The range of composition characterized by the absence of OH-absorption peaks around 3 µm was found. The concentration dependence of molecular refraction values on barium metaphosphate composition shows the inflection points in area at 1.0 mol.% and 2.0 mol.% of Ba(PO3)2. The analysis of the data obtained by Rayleigh and Mandel’shtam-Brillouin scattering (RMBS) spectroscopy determined the composition which has the minimum value of Landau-Placzek ratio (RL-P). Er3+ doped fluoroaluminate glasses were prepared by the same technique. The near infrared luminescence spectra of glasses corresponding to the 4I13/2 → 4I15/2 transition of Er3+ ions were observed. The mechanism of upconversion emissions Er3+ was discussed. Green and red emission bands at around 523, 546, and 660 nm wavelength were explained by two-photon process.

Victor A. Klinkov, Alexandr V. Semencha, Evgenia A. Tsimerman
Dynamic Data Packaging Protocol for Real-Time Medical Applications of Nanonetworks

The article considers the problems of optimization of the load on communication channel, created by the traffic of a medical nanonetworks application. Previously developed operating modes were analyzed and evaluated, new protocol was suggested. This protocol allows to optimize the load on communication channel. Also simulation of traffic was carried out, result of simulation allows to evaluate the advantages of the developed protocol.

Rustam Pirmagomedov, Mikhail Blinnikov, Ruslan Glushakov, Ammar Muthanna, Ruslan Kirichek, Andrey Koucheryavy
Nano Communication Device with an Embedded Molecular Film: Electromagnetic Signals Integration with Dynamic Operation Photodetector

Nano-devices with embedded molecular films appear as promising nano communications tools. In general, processing in such hybrid nano-device consists of initial energy of both activated electronic and atomic subsystems of an embedded molecular species, followed by intra- and inter-molecular nanoscale signals generation and reception of the transmitted signal at remote site. Actually, electromagnetic radiation can establish wireless nano communication in Visible, Infrared, and Microwave frequency ranges. In this manuscript, we estimate some properties of a microelectronics receiver in such systems, presented by novel dynamic operation pin photodetector, possesses signal integration, and required for receiving and demodulation of an electromagnetic wave. Revealed both theoretical and experimental characteristics of a photodetector have allowed designing dynamic process scenarios, as well as its possible applications inside a nano network.

Dmitrii Dyubo, Oleg Yu. Tsybin
A Formal Definition for Nanorobots and Nanonetworks

Nano computation and communication research examines minuscule devices like sensor nodes or robots. Over the last decade, it has attracted attention from many different perspectives, including material sciences, biomedical engineering, and algorithm design. With growing maturity and diversity, a common terminology is increasingly important.In this paper, we analyze the state of the art of nanoscale computational devices, and infer common requirements. We combine these with definitions for macroscale machines and robots to define Nanodevices, an umbrella term that includes all minuscule artificial devices. We derive definitions for Nanomachines and Nanorobots, each with a set of mandatory and optional components. Constraints concerning artificiality and purpose distinguish Nanodevices from nanoparticles and natural life forms. Additionally, we define a Nanonetwork as a network comprised of Nanodevices, and show the specific challenges for Medical Nanorobots and Nanonetworks. We integrate our definition into the current research of Nanodevice components with a set of examples for electronic and biological implementations.

Florian Büther, Florian-Lennert Lau, Marc Stelzner, Sebastian Ebers
Features of Use Direct and External Modulation in Fiber Optical Simulators of a False Target for Testing Radar Station

The purpose of this paper was to develop and research the fiber optical simulators of false target with direct and external modulation for testing radar station for the X-range. The modes of testing radar station by simulator depending on external conditions were studied. Time, spectral and frequency responses have been received. The optimum modes of simulators depending on external conditions have been defined.

Margarita Yu. Tarasenko, Vadim V. Davydov, Vladimir A. Lenets, Natalya V. Akulich, Tatyana R. Yalunina

Next Generation Wired/Wireless Advanced Networks and Systems (NEW2AN 2017)

Frontmatter
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on different levels in order to find anomalous patterns. The detection results obtained show us that the co-residence verification attack can be detected with the methods that are usually employed for botnet analysis.

Mikhail Zolotukhin, Elena Ivannikova, Timo Hämäläinen
Health-Care Pervasive Environments: A CLA Based Trust Management

Pervasive computing environments and technologies have attracted much attention in the health-care field recently. The application of pervasive computing technologies in the public health and medicine caused the emergence of pervasive healthcare as a new concept. Using pervasive healthcare, patients are able to access to the health and medical services at anytime and anywhere. However selecting the most trusted service provider among available ones is a challenging task. In this paper, we have proposed a new model for pervasive health-care systems in which the patient smart device not only uses its own past experiences but also learns from its neighbors (friends) in a health-care social network to update the trust of available providers using a CLA (cellular learning automata). Comparing the proposed method with existing recommendation based methods shows that it is more scalable, efficient and appropriate for dynamic environments without sacrificing the precision.

Omid Bushehrian, Shayeste Esmail Nejad
Physical-Layer Security for DF Two-Way Dual-Hop Cooperative Wireless Networks over Nakagami-m Fading Channels

Cooperative communication is a new technique that enables single antenna devices to share their antennas and help other nodes in relaying their signals. Hence, higher spatial diversity, reduced power consumption and improved reception reliability are achieved. In this paper, two way dual-hop cooperative network with source and jammer for decode and forward relaying scheme and under physical layer security is analyzed and investigated, where half-duplex mode and Nakagami-m fading channels are employed. The secrecy outage probability and the correct computation probability for single relay are derived to evaluate the secrecy performance of the system. Theoretical results are given for the derived expressions.

Islam M. Tanash, Mamoun F. Al-Mistarihi, Amer M. Magableh
Physical-Layer Security for DF Two-Way Full-Duplex Cooperative Wireless Networks over Rayleigh Fading Channels

Cooperative communication is a new method that uses multi-hop communication to send the information from source to sink. The broadcast nature of wireless signals causes the communication process to be vulnerable to wireless attacks such as eavesdropping attacks, in which a non-legitimate user tries to overhear the exchanged data between legitimate users. Physical layer security can be achieved by using jamming signals. This paper discusses and analyzes the proposed system model for a decode-and-forward two-way scheme under physical layer security where full-duplex mode and Rayleigh fading channels are employed. The secrecy outage probability in case of single relay is derived in order to evaluate the secrecy performance of the proposed system in which the transmission process takes two time slots. Theoretical results are given for the derived expression and a simple comparison with half-duplex system model is made.

Islam M. Tanash, Amer M. Magableh, Mamoun F. Al-Mistarihi
DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories based on the type of analysis. We conclude with a comparison between the various detection techniques. We introduce one real Advanced Persistent Threat campaign that utilizes DNS tunneling, and theoretically compare how well the surveyed detection techniques could detect it.

Viivi Nuojua, Gil David, Timo Hämäläinen
Digital Watermarking Method Based on Image Compression Algorithms

Digital watermarking is an efficient method for digital access rights management utilized in the scope of multimedia data. A possibility to combine the procedure of compression and watermarking in effective way for digital images is proposed in this manuscript. This research is focused on the compression methods considering the significance of the initial multimedia object (for example image) different elements to increase the quality of process (compressed) image. One of the most effective approaches for this task is to utilize Error Correcting Codes (ECC) allowing to maintain the number of resulting errors (distortion) as well as the value of resulting compression ratio. The application of such codes enables to distribute errors that are added during the processing procedure according to predefined significance of the initial multimedia object elements. The approach based on Weighted Hamming Metric guarantying the limitation of maximum errors (distortions) with predefined significance is represented as an example.

Sergey Bezzateev, Natalia Voloshina
Development of the Credit Risk Assessment Mechanism of Investment Projects in Telecommunications

We developed a mechanism of modelling of internal credit ratings (ICRs). It is applied in investment controlling to assess the credit quality of projects of telecommunication companies. Its advantages over the conventional credit risk modelling approaches are higher robustness and incorporation of all modelling operations in one mechanism. The mechanism gives the possibility to compare of modelled ICRs to the public credit ratings assigned by reputable international credit agencies. To achieve higher accuracy, the mechanism converts the input financial data, presented in different accounting standards, to the common basis. The explanatory variables in the mechanism are closely aligned with the credit risk assessment factors listed in the methodologies of international credit rating agencies. The testing of the mechanism shows that ICRs modelled with application of our mechanism had the accuracy ratio of 55% for testing sample and 65% for the design sample. This exceeds the accuracy ratios of ICRs modelled with application of conventional approaches (37%–42%).

Sergei Grishunin, Svetlana Suloeva
High-Tech Sector in the Conditions of Institutionalization of the Smart Economy (on the Example of the Telecommunication Industry)

The article contains a theoretical analysis of the institutionalization of the Smart Economy as a new type economy on the materials of communications industry. The analysis is based on the research of interrelations between the concepts of “cluster”, “network transactions” and “collaboration”. The perspectives of participation of the telecommunications industry enterprises in the clusters formation are shown. The conjunction of the merits of the hierarchical and market structures in the clusters is due to the network nature of clusters, the possibility of combining of the cooperation and the competition between participants. The proliferation of clusters in the high-tech sectors of economy is associated with the advantages of network transactions. Specific characteristics of network type transactions and their advantages to the interacting parties are identified. The awareness of the levels of institutionalization of the Smart Economy and the consistent movement on the chain “clusters - network transactions - collaboration” when building relations between the cluster participants will allow a qualitative solution of a number of problems facing the Russian communications industry.

N. V. Vasilenko, A. J. Linkov, V. V. Glukhov
Virtual Telecommunication Enterprises and Their Risk Assessment

The article describe virtual telecommunication enterprises risks, their possible causes and ways of elimination, using the economic-mathematical model of risks assessment.

N. V. Apatova, O. V. Boychenko, Tatyana P. Nekrasova, S. V. Malkov
Peculiarities of Creation of Information System at the Enterprises of Telecommunication Branch

Nowadays it is hard not to notice a priority of development of hi-tech production in different countries including the Russian Federation. The fact that unique (high) technologies are a subject of interest of our country is confirmed by existence of plans of implementation of the programs developed by various ministries and departments of the Russian Federation. Their financing from the state budget is measured by trillions of rubles. The special place among the knowledge-intensive and high-tech industries is occupied by telecommunication branch. Many enterprises of this sphere think of introduction of corporate information systems for the purpose of optimization of management accounting and improvement of quality of planning. Nevertheless, the existing information systems are unsuitable for the accounting of this type of hi-tech production owing to its considerable uniqueness. The article considers major factors of unfitness of the information systems functioning at the moment for management accounting of production of telecommunication branch. The authors analyse necessary set of characteristics of an information system for optimization of its use in telecommunication branch. The authors define necessary modules of information systems at the enterprise, which introduction will allow automating the accounting of the resources necessary for development of scientific and technical innovations. That will increase the level of innovative development of the Russian Federation.

Ye. Yu. Vinogradova, A. I. Galimova, Natalya V. Mukhanova, S. L. Andreeva
A Game-Theoretic Model for Investments in the Telecommunications Industry

The rent-seeking behavior of domestic and foreign investors of the telecommunications sector was considered and analyzed. A game-theoretic model determining the behavior of investors was developed. Comparative results for three or more investors were obtained. The model of rent-seeking behavior, when each player is not indifferent about who will get the prize if he does not receive it himself, was proposed. The model is analyzed in cases of identical and different estimates of the rent by the players. The formulas for total equilibrium costs of the rent-seeking behavior as well as the individual equilibrium costs for each of the domestic and foreign firms under identical and different estimates of the rent were obtained. A situation with two Russian and one foreign investor of the telecom sector of the Russian Federation was deeply examined.

Sergey A. Chernogorskiy, K. V. Shvetsov
Business Perception Based on Sentiment Analysis Through Deep Neuronal Networks for Natural Language Processing

In recent years, the machine-learning field, deep neural networks has been an important topic of research, used in several disciplines such as pattern recognition, information retrieval, classification and natural language processing. Is in the last that this paper it’s going to be our principal topic, in this branch exist an specific task that in literature is called Sentiment Analysis were the principal function is to detect if an opinion is positive or negative.In the paper we show how use this subset of the machine learning knowledge and use it for give us an insight in the question: what is the perception in a business or a product by means of the opinion of the consumers in social networks?

Mónica Pineda Vargas, Octavio José Salcedo Parra, Miguel José Espitia Rico
Cognitive Models for Access Network Management

Research has highlighted the necessity of a cognitive nature of the access network (AN) management model intended as a cognitive representation describing a new NGN/IMS and post-NGN business processes. The AN management problems are solved more or less for existing digital fixed and mobile telecommunications networks. But applying the same principles for management new services in new post-NGN telecommunication networks with IoT, Cloud computing, Big Data analysis, CEM, etc. seems not to be perspective. Usage of cognitive approach with fuzzy cognitive maps (FCMs) might be very useful in this new telecommunication paradigm. The goal of this paper is to provide modern cognitive AN management approaches with FCMs survey.

Vladimir Akishin, Alex Goldstein, Boris Goldstein
Bargaining in a Dual Radar and Communication System Using Radar-Prioritized OFDM Waveforms

This paper examines a dual radar/communication system employing OFDM style waveforms with two objectives: a radar task involving target tracking, and a communication task involving communicating with a distant receiver. One challenge with such two objective problems is that the optimal solution for one of objective could be non-optimal for the other. We examine the problem of resolving dual radar/communication objectives and solve the associated two objective problem in two steps: First, for each fixed level of performance for the radar’s objective, the optimal solution is found in a water-filling form which includes the classical OFDM waterfilling solution as a boundary case. The formulation returns a continuum of optimal solutions (a solution per radar performance level). Second, from this continuum of solutions, we find the Nash bargaining solution, which returns the best tradeoff between the two objectives, and an algorithm to find the Nash bargaining solution is presented.

Andrey Garnaev, Wade Trappe, Athina Petropulu
Discrete Time Bulk Service Queue for Analyzing LTE Packet Scheduling for V2X Communications

Cellular technologies are promoted by different stakeholders as a key enabler to support vehicle-to-everything communications. In this paper, we shed light into the performance of the LTE (Long Term Evolution) technology in delivering messages generated by vehicles under different network configurations and workload settings. To this purpose, by employing methods of queuing theory, we derive closed-form expressions and provide numerical results for reliability and latency metrics.

Vitalii Beschastnyi, Valeriy Naumov, Pasquale Scopelliti, Irina Gudkova, Claudia Campolo, Giuseppe Araniti, Iliya Dzantiev, Konstantin Samouylov
Structure Analysis of an Explanatory Dictionary Ontological Graph

When working with large connected systems, it is important to present the data in a form that is easy to analyze and process. For that purpose an ontological graph is often used. In this paper, developed tools for constructing and analyzing an ontological graph of the connections in the Russian explanatory dictionary are described. The concepts of specificity of oriented graphs with a large number of loops, vertices and edges are introduced: the vertex hierarchy, word basin, basin shell and basin volume are determined. The statistical properties of ontological graph are investigated.

Yu. N. Orlov, Yu. A. Parfenova
Performance Optimization of a Clustering Adaptive Gravitational Search Scheme for Wireless Sensor Networks

In this research we propose a new clustering scheme based on a combination of a well known stochastic, population-based Gravitational Search Algorithm (GSA) and the k-means algorithm to select optimal reference nodes in a Wireless Sensor Networks (WSN). In the proposed scheme the process of grouping sensors into clusters reference nodes is based on a K-means clustering algorithm to divide the initial population and select the best position in the neighbourhood to exchange information between clusters. In cases when sensor nodes receive multiple synchronization messages from more than one reference node a weighted average method is used. In this paper we limit our research on a number of benchmark functions which are used to compare the performance of the proposed algorithm with other important meta-heuristic algorithms to show its superiority.

Elham Pourabdollah, Reza Mohammadi Asl, Theodore Tsiligiridis
A Retrial Queueing System with Preemptive Priority and Randomized Push-Out Mechanism

A single-server finite-buffer retrial system with a Poisson stream of arrivals and an exponential service time distribution is analyzed. If an arriving customer finds the buffer filled up, this customer joins a special retrial waiting group (orbit) in order to seek service again in an exponentially distributed period of time. The customers seeking service for the first time have the preemptive priority over retrial ones, thus, one can think of the original system as of the priority one with retrial customers being low-priority. We also introduce a randomized push-out buffer management mechanism, which makes it possible to control the loss probability of the high-priority and low-priority customers efficiently.It is shown that such queueing model can be reduced to a similar one but without retrial. Using the generating function technique, main probabilistic characteristics (e.g., loss probabilities) for both types of the customers are obtained. The dependency of the loss probabilities on the model parameters, i.e., the push-out and retrial probabilities, is investigated. Regions of the load parameters are found such that the system is locked for the low-priority customers, or such that there is a linear dependence of the loss probabilities on the push-out probability.

Alexander Ilyashenko, Oleg Zayats, Maria Korenevskaya, Vladimir Muliukha
NGN/IMS and post-NGN Management Model

The goal of this paper is to provide a new telecommunications network management model that will be adequate to the modern and future NGN/IMS and post-NGN telecommunications networks. Instead of the traditional OSS/BSS approach in the article we propose a new comprehensive approach for the communication networks management, which is adequate to the paradigm shift in telecommunications that takes place currently, as well as a comprehensive approach to building mathematical models of the management organization and self-organization in the new post-NGN era.

Alex Goldstein
The Principles of Antennas Constructive Synthesis in Dissipative Media

The results of tasks solving of the antennas constructive synthesis (CS) in the dissipative media are presented in this article. The function schemes of the conceptual models immersed in the antennas dissipative media are presented, which are suitable for the analysis by means of finite element method (FEM) and finite difference time domain method (FDTD). The special models parameters which allow us to take into account the influence of the infinite boundary and dissipative media on the electric characteristics of the immersed antennas are discovered.The general approach to cost functions forming up is presented in the article. The cost functions allow us to conduct the synthesis of the immersed antennas. The presented cost functions are used for the optimization of the immersed antennas constructive parameters by means of multicriteria optimization of the genetic algorithm (GA). The results of the constructive synthesis of the immersed laminate kind antennas by the FEM-GA methods link are presented. The strong and weak points of the latter are shown in the article. The practical usage recommendations of the developed antennas are given.

Roman U. Borodulin, Boris V. Sosunov, Sergey B. Makarov
Amplitude and Phase Stability Measurements of Multistage Microwave Receiver

The measurement technique and results of amplitude and phase stability measurements of microwave receiver and its separate stages are presented in this paper. Investigations were performed for prototype of new wideband receiving system for 13-m radio telescope RT-13 of the Institute of Applied Astronomy of the Russian Academy of Sciences. The receiver has two parallel channels for receiving linear orthogonal polarization and each of them is heterodyne type ones. The main sources of fluctuations and their types on different time intervals (from milliseconds to hundreds of seconds) are identified using Allan variance, power spectral density and correlation functions calculations. Phase stability measurements of unit with frequency conversion were performed by using 4-port R&S vector network analyzer. The contribution of the fluctuations of receiver separate stages to the overall receiver stability is determined taking into account the correlation between their fluctuations also.

Yuriy V. Vekshin, Alexander P. Lavrov
Evolving Toward Virtualized Mobile Access Platform for Service Flexibility

This paper deals with the application of virtualization technology, which is regarded as important technology for securing service flexibility in 5G mobile communication system, to base stations. 5G mobile communication should provide users with personalized, localized and intelligent new concept services. Therefore, it is necessary to secure design and implementation technology that guarantees flexibility of its structure in addition to communication technology such as high speed, low delay, and concatenation. The 5G mobile communication infrastructure with virtualization can adapt and reconfigure communication functions adaptively to the environment, so that it can quickly reflect the needs of users and markets. The services of the 5G can be accommodated by sharing resources in one equipment, rather than requiring different devices for execution. In this paper, we design a virtualized access platform with Cloud, Virtualization, and SDN concepts. This includes the virtualization design of wireless transport modem, wireless access protocol, and radio resource management functions. The design is implemented as Service Virtualization subset where SON and RRM are virtualized and confirmed that LTE basic service and SON Network Monitoring functions operate in the standard including commercial user terminal and core network.

Seung-Que Lee, Jinup Kim
Model of Photonic Beamformer for Microwave Phased Array Antenna

Photonic beamformer model for linear phased array antenna in the receive mode has been developed, investigated and experimentally tested. The proposed beamformer scheme based on true-time-delay technique, DWDM technology and fiber chromatic dispersion has been designed. The beamforming arrangement for ultra wideband antenna array can currently provide the required true time delay capabilities by using modern fiber-optical telecom components available at the market. The attention was paid to measurements of intrinsic time delays in used fiber-optic components which are significant for beamformer design. Experimental demonstration of the designed model beamforming features included actual measurement of 5-element receiving microwave linear phase array antenna far-field patterns in 6–18 GHz frequency range for antenna pattern shifts up to 40º which show no squint effect. The influence of inaccuracy of photonic beamformer channels time delays setting and amplitude aligning on the antenna beamforming has been also analysed.

Sergey I. Ivanov, Alexander P. Lavrov, Igor I. Saenko
Nanosecond Miniature Transmitters for Pulsed Optical Radars

The-state-of-the-art in long-distance near-infrared optical radars is utilization the laser-diode-based miniature pulsed transmitters producing optical pulses of 3–10 ns in duration and peak power typically below 40 W. The bandwidth of the receiving channel nowadays exceeds 300 MHz, and thus the duration of the optical pulses exceeding 3 ns is a bottleneck in the task of high practical importance, namely increase in the radar ranging precision. Nowadays the speed of the high-current drivers is limited by the speed of a semiconductor switch that is typically field-effect transistor or an avalanche switch. The last one provides faster switching, and development of new avalanche switches is very challenging and important task, but this is not the only factor limiting the transmitter speed. Here we show that not only the switch, but also parasitic inductance in the miniature assembly and type of the capacitor play very important role in solving the problem of long-distance decimeter-precision radar.

Alexey V. Filimonov, Valery E. Zemlyakov, Vladimir I. Egorkin, Andrey V. Maslevtsov, Marc Christopher Wurz, Sergey N. Vainshtein
Fog Computing for Telemetry Gathering from Moving Objects

The paper describes two approaches to gathering measurement data about moving objects in wireless networks. The use of Fog computing technology makes it possible to relocate a part of calculations closer to measuring devices. The first approach suggests an estimation of telemetry quality into measuring points. The second approach uses prediction of telemetry quality by mining models. As a result, it became possible not only to redistribute the computational load, but also to significantly reduce the network traffic, which in turn brings the possibility to decrease the requirements for communication channels bandwidth and to use wireless networks for gathering telemetry.

Ivan Kholod, Nikolai Plokhoi, Andrey Shorov
Stability and Delay of Algorithms of Random Access with Successive Interference Cancellation

The article is devoted to the work of class of Random Access algorithms with Successive Interference Cancellation. This class of algorithms includes Irregular Repetition Slotted ALOHA, Contention Resolution Diversity Slotted ALOHA and other algorithms in which the Random Access is combined with successive interference cancellation. We propose method of stabilization and lower bound of average delay for this class of algorithms.

Nikolay Apanasenko, Nikolay Matveev, Andrey Turlikov
Throughput Analysis of Adaptive ALOHA Algorithm Using Hybrid-ARQ with Chase Combining in AWGN Channel

This article is devoted to the class of algorithms of random multiple access, such as adaptive Aloha, in which throughput is limited by $$e^{-1}$$. This class can be expanded by using Hybrid-ARQ with Chase combining. For this expansion, an upper bound was obtained, which turned out to be 0.523.

Artem Burkov, Nikolay Kuropatkin, Nikolay Matveev
Characterizing Time-Dependent Variance and Coefficient of Variation of SIR in D2D Connectivity

Attempting to build a uniform theory of mobility-dependent characterization of wireless communications systems, in this paper, we address time-dependent analysis of the signal-to-interference ratio (SIR) in device-to-device (D2D) communications scenario. We first introduce a general kinetic-based mobility model capable of representing the movement process of users with a wide range of mobility characteristics including conventional, fractal and even non-stationary ones. We then derive the time-dependent evolution of mean, variance and coefficient of variation of SIR metric. We demonstrate that under non-stationary mobility behavior of communicating entities the SIR may surprisingly exhibit stationary behavior.

Anastasia Ivchenko, Yuri Orlov, Andrey Samouylov, Dmitri Molchanov, Yuliya Gaidamaka
Analysis of Admission Control Schemes Models for Wireless Network Under Licensed Shared Access Framework

Nowadays, mobile operators are faced with a problem of shortage of radio resources required for qualitative customer services. One of the possible solutions is the framework named LSA (Licensed Shared Access), which is developed with the assistance of ETSI. The LSA spectrum is shared between the owner (incumbent) and LSA licensee (e.g., mobile network operator). At any time, LSA spectrum could be used by incumbent or mobile network operator but not together at once. In this connection, if the incumbent needs its frequency, then LSA band becomes unavailable for mobile operator. This leads to service interruptions for mobile operator users. In this paper, we describe two possible Radio Admission Control (RAC) scheme models of the 3GPP LTE cellular network within LSA framework as finite queuing systems with reliable (single-tenant band) and unreliable (multi-tenant band) servers. Multi-tenant band is assumed to be intolerant to traffic delay. The formulas for calculating the performances measures – blocking probability, probability of service interruption and probability of service band changing – are proposed. The numerical analysis is provided for LSA example scenario of aeronautical telemetry.

Ekaterina Markova, Dmitry Poluektov, Darya Ostrikova, Irina Gudkova, Iliya Dzantiev, Konstantin Samouylov, Vsevolod Shorgin
Low-Complexity Iterative MIMO Detection Based on Turbo-MMSE Algorithm

Next generation Multiple Input Multiple Output (MIMO) communication systems should meet strict performance requirements and keep reasonable complexity. This paper presents a new low-complexity approach for iterative MIMO detection which is based on enhanced Turbo procedure. In the algorithm such components as linear Minimum Mean Square Error (MMSE) detection and soft symbol estimation based on the MMSE solution are utilized. A new original procedure of getting extrinsic data essentially improves the receiver performance and reduces its complexity. The results of the study are validated by link-level simulations.

Mikhail Bakulin, Vitaly Kreyndelin, Andrey Rog, Dmitry Petrov, Sergei Melnik
Rubidium Atomic Clock with Improved Metrological Characteristics for Satellite Communication System

One of the essential elements of satellite communication system is an atomic clock. The proper operation of this system depends on the performance of atomic clock. In this paper one of the directions of modernization of the rubidium atomic clocks is considered. A new design of the frequency synthesis circuitry is presented. The new design of frequency synthesizer is based on method of direct digital synthesis. Theoretical calculations and experimental research showed a decrease in the step frequency tuning by several orders and significant improvement in the spectral characteristics of the output signal of frequency converter. A range of generated output frequencies is expanded. A summary of performance results of rubidium atomic clock, in particularly Allan variance, achieved to date is also provided.

Alexander A. Petrov, Vadim V. Davydov, Nikita S. Myazin, Vladislav E. Kaganovskiy
Provision of Connectivity for (Heterogeneous) Self-organizing Network Using UAVs

This paper presents results of wireless sensor networks connectivity analysis. Authors propose the algorithm for WSN connectivity recovering by using of additional nodes which may be placed on the UAVs. Proposed algorithm based on the graph theory and data of network nodes positions. This algorithm allows selection of a minimal number of additional nodes and their positions.

Alexander Paramonov, Ilhom Nurilloev, Andrey Koucheryavy
Performance Evaluation of COPE-like Network Coding in Flying Ad Hoc Networks: Simulation-Based Study

This paper investigates the performance of network coding in Flying Ad Hoc Networks (FANETs) with help of NS-3 simulation tool. We compared the efficiency of COPE-like network coding for “copter”, “fixed-wing drone”, and “swarm” scenarios by quality of service (QoS) metrics. We use 802.11g standard at the data-link layer and AODV routing protocol at the network layer of OSI model. Average QoS metrics were estimated in 50 simulation runs for each parameter set. Results show that using of network coding in “copter” and “fixed-wing” scenarios improves PDR and goodput metrics. In “swarm” scenario the efficiency of network coding degrades for swarms with low density of nodes.

Danil S. Vasiliev, Irina A. Kaysina, Albert Abilov
Communication Technologies in the Space Experiment “Kontur-2”

The issues on using of the communication technologies for the remote control of on-ground robots from the Russian Segment of the International Space Station (ISS RS) in the frame of “Kontur-2” space experiment are presented. Characteristics of communication channels used in this control system ensure elements of telepresence for an operator using visual and tactile feedback. Results of space sessions are presented.

Vladimir Muliukha, Vladimir Zaborovsky, Alexander Ilyashenko, Yuri Podgurski
Accuracy of Secondary Surveillance Radar System Remote Analysis Station

The Distance Analysis System (DAS) for a Secondary Surveillance Radar System (SSRS) analysis is considered. The DAS assumes the usage of the Remote Analysis Station (RAS) for the aircraft position determination and the SSRS and DAS results comparison in order to detect the analyzed system errors. The DAS error sources are considered. The RAS errors for the different aircraft positions and different initial errors are estimated. The DAS and the analyzed both monostatic and bistatic SSRS accuracies are compared for different aircraft positions related to the RAS and the Secondary Surveillance Radar (SSR) locations. The recommendations about the RAS location provided the highest DAS accuracy are given.

Igor A. Tsikin, Ekaterina S. Poklonskaya
Spectral and Energy Efficiency of Optimal Signals with Increased Duration, Providing Overcoming “Nyquist Barrier”

Optimal signals with increased duration, providing overcoming “Nyquist Barrier”, are considered. Optimization task of searching envelopes of signals is presented and numerically solved. Solutions of optimization task for different signal durations and correlation coefficients are presented. Corresponding energy spectra are also checked. The dependence of occupied frequency bandwidth for different level of energy spectra is obtained. BER performance of proposed optimal signals was checked by simulation. It is shown, that energy losses can be reduced by reducing correlation coefficient in optimization task and in resulting optimal signals. Application of optimal signals with increased duration allows to be closer to Shannon boundary and provides realization of data transfer with overcoming “Nyquist Barrier”. It was done by increasing spectral efficiency for different level of energy spectra.

Anna S. Ovsyannikova, Sergey V. Zavjalov, Sergey B. Makarov, Sergey V. Volvenko, Trinh Luong Quang
Choosing Parameters of Optimal Signals with Restriction on Correlation Coefficient

Optimal signals with smoothed envelopes and increased duration are considered. Smoothed envelopes were obtained by optimization task with restriction on the energy of signal, boundary conditions and restriction on intersymbol interference. Solutions of optimization task for different values of restrictions are considered. It is shown that increasing of duration of optimal signals leads to increasing of the maximum value of the envelope and nonlinear change of the energy spectrum’s form. We can assume that as correlation coefficient becomes less, the form of envelope gets closer and closer to the form of the function sin(x)/x and the maximum value of the envelope becomes larger. Energy loss relatively to the theoretical BER performance of BPSK signals is not more than 0.2 dB for correlation coefficient 0.01. Increasing of correlation coefficient is accompanied by degradation of BER performance. This effect is especially evident for high values of signal duration. So for multifrequency signals choosing small values of correlation coefficient more than 0.1 may be reasonable because of reducing occupied frequency bandwidth. Energy losses which occur for small values of correlation coefficient, may be compensated by redundancy of transmitted data. For one-frequency signals it is better to choose small values of correlation coefficient (less than 0.1).

Anna S. Ovsyannikova, Sergey V. Zavjalov, Sergey B. Makarov, Sergey V. Volvenko
The Filtration of Composite Signals from Interference by the Maximum Likelihood Method

The technology of wideband signals filtering in the presence of non-orthogonal interference and the additive noise is presented in this work. It is shown that interference can be represented as a pulse with constant unknown parameters, which can be estimated by means of maximum likelihood method, and deleting from the received message. Presents the results of model calculations and experiments, confirming the main theoretical insights.

Kseniia V. Vlasova, Valerii A. Pakhotin, Evgenii V. Korotey, Sergey B. Makarov
Direct Signal Processing for GNSS Integrity Monitoring

Angle-of-arrival (AOA) integrity monitoring method for global-navigation satellite systems (GNSS) is discussed. In accordance with the AOA method, the direct decision making procedure (DDMP) about integrity presence or absence is created on the basis of direct antenna array signal processing. The DDMP is statistically simulated, and thus the most important characteristics, such as false alarm and missed detection probabilities, are estimated for different planar antenna arrays. The results of simulations show the algorithms efficiency areas for different structures of antenna arrays, so that finally the relationship between the number of antenna elements and missed detection probability are achieved for different number of analyzing signals. Comparison of DDMP with the decision making procedure for the AOA method, based on direction finding results post-processing, shows efficiency of DDMP both in terms of probability based characteristics and required computational costs.

Igor A. Tsikin, Antonina P. Melikhova
An Intentional Introduction of ISI Combined with Signal Constellation Size Increase for Extra Gain in Bandwidth Efficiency

In this paper, we investigate the possibility to obtain an additional bandwidth efficiency gain for signals with intentionally introduced inter symbol interference (ISI) by increasing the signal constellation size. We analyzed single-carrier signals with QPSK and 16-QAM signal constellations. The ISI is introduced by the optimal finite pulses obtained by the linear optimization. The criterion of the optimization problem was maximization of the free Euclidean distance under a fixed bandwidth comprising 99% of signal power and for the chosen constellation. We used the sphere decoding (SD) algorithm for the signal detection under assumption of additive white Gaussian noise channel. The simulation results have shown that the maximal increase of bandwidth efficiency is provided when the ISI introduction is utilized simultaneously with the increase of signal constellation size.

Van Phe Nguyen, Anton Gorlov, Aleksandr Gelgor
Foreground Detection Using Region of Interest Analysis Based on Feature Points Processing

Analysis of regions of interest is a promising approach for performance improvement of many applications related to video signal processing and transmission. Many state-of-the-art methods face challenges like global luminance changing, objects camouflage, etc. This paper is dedicated to a new method of foreground detection employing region of interest analysis. The main idea of the proposed method is processing feature points located in the regions with object movement. The performance of the foreground detection was estimated using ground truth data and F1-Score criterion.

Nikita Ustyuzhanin, Marat Gilmutdinov
Modified EM-Algorithm for Motion Field Refinement in Motion Compensated Frame Interpoliation

Motion-compensated frame interpolation is required in many applications, e.g. packet-based video transmission error concealment, frame rate up-conversion, etc. One of the most important challenges of temporal interpolation is the accuracy of motion estimation. Several approaches for improving the motion estimation performance are proposed in this paper. Global motion vectors and motion segmentation allow for motion vectors field refinement. Performance of proposed motion-compensated temporal interpolation method is compared with several modern temporal interpolation methods.

Nikolay Nemcev, Marat Gilmutdinov
The Models of Moving Users and IoT Devices Density Investigation for Augmented Reality Applications

Applications of augmented reality penetrate into all spheres of human life. With the emergence of glasses of augmented reality, the introduction of this technology in VANET (Vehicular ad hoc network), etc. a number of interesting questions arise. For example, the amount of data that a user can perceive and understand the significance of the received content. The article develops a user perception model, which depends on the type of data, the amount of information and the significance of the data. The user is a queuing system object that receives various data from the surrounding objects. The data is ranked according to the priorities for which the transmission characteristics are determined. With the movement of the user, objects in his environment change. The user perception model defines the requirements for the service delivery model, which will allow the maximization of information that the user can perceive.

M. Makolkina, A. Koucheryavy, A. Paramonov
Quality of Experience Estimation for Video Service Delivery Based on SDN Core Network

Video traffic plays an increasingly important role in today’s telecommunication networks. Most services are difficult to imagine without video stream transmission, and it is not only IPTV and OTT services, but also the services of augmented reality that are gaining popularity. At the same time, users’ requirements for quality of experience provision are constantly tightened. Therefore, operators need to look for new ways to deliver video content to the user, which will allow the transfer of large amounts of traffic with the appropriate quality of experience. In this article, the possibilities of using SDN networks for the transmission of video traffic are investigated. For this purpose, we have created a laboratory testbed, which consists of a multimedia complex for the delivery of IPTV content and a SDN segment of the network. To estimate the quality of experience of the transmitted video traffic, we used, in addition to the generally accepted parameters, such as delays, losses, throughput, also the Hurst parameter.

Maria Makolkina, Ammar Muthanna, Steve Manariyo
LTE MCS Cell Range and Downlink Throughput Measurement and Analysis in Urban Area

The measurement in this study was conducted using a TEMS Pocket engineering model test phone, through which the cell coverage and cell capacity of LTE were analyzed using the KPI parameters of packet switch (PS) between the 4G EnodeB base stations (BSs) and user equipment (UE). Of the 60 EnodeB BSs that were measured, 46 supported the 700 MHz band, 35 supported the 1800 MHz band, and 6 supported the 2600 MHz band. The analysis results for the measurement data showed that the modulation code scheme (MCS) cell range means for MCS (0)–MCS (28) in Banqiao District were approximately 0.2–0.91 km, with an overall MCS average of 0.45 km. Cell capacity was presented using downlink (DL) throughput; the analysis results illustrated that the average DL throughputs were roughly 5.37 Mb/s–49.71 Mb/s, and the overall MCS average throughput was 18.87 Mb/s. The signal-to-interference-plus-noise ratio (SINR) means for MCS (0)–MCS (28) were approximately −5.33–20.38 dB, and the overall MCS averaged SINR was approximately 6.04 dB. The reference signal received power (RSRP) means for MCS (0)–MCS (28) were approximately −111.86–−73.83 dBm, and the overall MCS averaged RSRP was approximately −94.09 dBm. Finally, the analysis and comparison of the theoretical values and actual measurement illustrated that the data curves for this study were consistent with the 3GPP specifications, with SINR and the theoretical curve achieving a correlation of up to 0.936, and the DL throughput and the theoretical curve achieving a correlation of up to 0.933.

Yi Hua Chen, Kai Jen Chen, Jyun Jhih Yang
Transfer of Multimedia Data via LoRa

This article provides the results of the multimedia data transmission parameters research by LoRa using, in particular the results of images and voice transmission using the fragment of the model network in the Internet of Things Laboratory SPbSUT. During the series of experiments there was noticed the LoRa radio modules performance variation of different parameters (Bandwidth, Spreading Factor and Coding Rate), which have affected on the time and quality of image transmission. For image compression were used JPEG and JPEG 2000 methods, which have allowed to achieve an acceptable compression and image reconstruction while transmitting in the low-speed network. In the course of the experiment, the images were transferred from a camera mounted on a quadrocopter at distance of several kilometers. We considered such parameters as the time of data transfer, packet loss, estimation of the images quality obtained on the basis of subjective and objective methods. For voice compression, the A-law method was used, which allowed to compress the frame size by 4 times. Experiments of real-time speech transmission were conducted in different languages and evaluated by the experts. During the results analyzing there were defined the lower subjective score for Arabic, and the higher scores for English and Vietnamese. In conclusion, this article provides the results of the quantitative and qualitative dimensions evaluation and presents directions for the further research.

Ruslan Kirichek, Van-Dai Pham, Aleksey Kolechkin, Mahmood Al-Bahri, Alexander Paramonov
Practical Results of WLAN Traffic Analysis

This paper presents some results of the WLAN traffic measurements and analysis. The main idea of the work is to describe some common parameters of the originated traffic which may be useful in the network planning and analysis tasks. Authors have considered such parameters as session duration, user activity, packet size, traffic intensity, and some others.

A. Paramonov, A. Vikulov, S. Scherbakov
Wi-Fi Based Indoor Positioning System Using Inertial Measurements

Recent time Wi-Fi-based positioning leads in non-GNSS methods for indoor positioning. Globally existing infrastructure is the main advantage of Wi-Fi-based methods. Traditional methods or gathering data for RSSI Fingerprint offline mode require costly site survey. This paper presents a method of RSSI data acquisition connected with inertial navigation system (INS) that takes less time without loss of positioning accuracy. Proposed algorithm gives opportunities to detect location for users without MEMS-platform on their mobile devices. Furthermore, Kalman filter is developed to decrease measurement errors. We evaluated our system in real conditions.

Mstislav Sivers, Grigoriy Fokin, Pavel Dmitriev, Artem Kireev, Dmitry Volgushev, Al-odhari Abdulwahab Hussein Ali
Power Allocation in Cognitive Radio with Distributed Antenna System

In this paper, the power allocation (PA) for a cognitive radio (CR) system with a distributed antenna system (DAS) is investigated. In the DAS, remote antennas are separated and connected to a central unit (CU) via optical fibre. In this article, the problem of power allocation for CR with DAS is formulated as an optimisation problem. Based on the Karush-Kuhn-Tucker (KTT) conditions for this optimisation problem, a suboptimal PA scheme is developed. The proposed algorithm maximises energy-efficiency (EE) while maintaining proportional fairness. Finally, simulation examples are presented to verify the proposed method. It is shown that the proposed algorithm is effective in power allocation for a CR system with DAS implementation.

Jerzy Martyna
Multi-level Cluster Based Device-to-Device (D2D) Communication Protocol for the Base Station Failure Situation

With the massive increase of wireless devices and the challenges associated, device-to-device (D2D) communication becomes a vital solution. Employing D2D communication achieves higher throughput, better cell coverage, increases the spectrum efficiency and other valuable benefits for the cellular networks. In this paper, D2D communication is used to overcome the problems occurred in the situation of Base station (BS) failure and maintain the communication inside the cell without BS. An energy efficient multi-level cluster based D2D communication protocol is introduced to maintain the cell operation even if the Base station is out of use. The protocol employs D2D communication and multi-level clustering to provide communication paths through the neighbouring cells and BSs. The proposed work also efficient if there is a catastrophic situation.

Abdelhamied A. Ateya, Ammar Muthanna, Anastasia Vybornova, Andrey Koucheryavy
Backmatter
Metadata
Title
Internet of Things, Smart Spaces, and Next Generation Networks and Systems
Editors
Olga Galinina
Sergey Andreev
Sergey Balandin
Yevgeni Koucheryavy
Copyright Year
2017
Electronic ISBN
978-3-319-67380-6
Print ISBN
978-3-319-67379-0
DOI
https://doi.org/10.1007/978-3-319-67380-6

Premium Partner