Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817169
Adina Elena Lupu Blaj, Tudor Blaj, A. Vlad
The paper focuses on mixing functions for cryptographic applications, pursued in the context of including the message in a dynamic system. The contribution of the dynamic system to the mixing function when the message is included in the dynamic system is highlighted. For the discussion we chose three popular dynamic systems - the Hénon map, the logistic map and the tent map - and we used the mixing functions suggested by C.E. Shannon. The analyzed aspects are illustrated on images, but the applicability is much wider.
{"title":"Cryptographic mixing transformations and message embedding in chaotic systems","authors":"Adina Elena Lupu Blaj, Tudor Blaj, A. Vlad","doi":"10.1109/comm54429.2022.9817169","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817169","url":null,"abstract":"The paper focuses on mixing functions for cryptographic applications, pursued in the context of including the message in a dynamic system. The contribution of the dynamic system to the mixing function when the message is included in the dynamic system is highlighted. For the discussion we chose three popular dynamic systems - the Hénon map, the logistic map and the tent map - and we used the mixing functions suggested by C.E. Shannon. The analyzed aspects are illustrated on images, but the applicability is much wider.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817293
Adrian Daniel Popescu, Alexander Westerhagen
The paper provides an overview of network softwarization. This refers to network changes and adaptations regarding the convergence to Software Defined Networking and Network Function Virtualisation as well as moving the network control to Data Centers and Mobile Edge. For doing this, basic concepts and elements used in the performance provision in softwarized networking environments are used. Adequate performance frame-works can be defined, including relevant metrics and models, to be used in the development, deployment and operation of cloud and edge computing architectures as well as 5G network slicing. The paper provides an overview of network slicing, backbone of 5G technology, as well.
{"title":"Network Softwarization: Developments and Challenges","authors":"Adrian Daniel Popescu, Alexander Westerhagen","doi":"10.1109/comm54429.2022.9817293","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817293","url":null,"abstract":"The paper provides an overview of network softwarization. This refers to network changes and adaptations regarding the convergence to Software Defined Networking and Network Function Virtualisation as well as moving the network control to Data Centers and Mobile Edge. For doing this, basic concepts and elements used in the performance provision in softwarized networking environments are used. Adequate performance frame-works can be defined, including relevant metrics and models, to be used in the development, deployment and operation of cloud and edge computing architectures as well as 5G network slicing. The paper provides an overview of network slicing, backbone of 5G technology, as well.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115402844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817189
Deren Dogan, Y. Dalveren, A. Kara
A considerable growth in demand for locating the source of emissions in outdoor environments has led to the rapid development of various localization methods. Among these, RF fingerprinting (RFF) localization has become one of the most promising method due to its unique advantages resulted from the recent developments in machine learning techniques. In this short review, it is aimed to assess the existing RFF methods in the literature for outdoor localization. For this purpose, firstly, the current state of RFF localization methods in outdoor environments are overviewed. Then, the main research challenges in the development of RFF localization are highlighted. This is followed by a brief discussion on the open issues in order to give future research directions. Furthermore, the research efforts currently undertaken by the authors are briefly addressed.
{"title":"A Mini-Review on Radio Frequency Fingerprinting Localization in Outdoor Environments: Recent Advances and Challenges","authors":"Deren Dogan, Y. Dalveren, A. Kara","doi":"10.1109/comm54429.2022.9817189","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817189","url":null,"abstract":"A considerable growth in demand for locating the source of emissions in outdoor environments has led to the rapid development of various localization methods. Among these, RF fingerprinting (RFF) localization has become one of the most promising method due to its unique advantages resulted from the recent developments in machine learning techniques. In this short review, it is aimed to assess the existing RFF methods in the literature for outdoor localization. For this purpose, firstly, the current state of RFF localization methods in outdoor environments are overviewed. Then, the main research challenges in the development of RFF localization are highlighted. This is followed by a brief discussion on the open issues in order to give future research directions. Furthermore, the research efforts currently undertaken by the authors are briefly addressed.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817328
O. Al-Dulaimi, Florin-Lucian Chiper, C. Vladeanu, Alexandru Martian
In cognitive radio (CR) networks, the non-licensed users access dynamically the available resources with the requirement to avoid causing interference for the licensed users. Therefore, the non-licensed or secondary users (SUs) have to use spectrum sensing (SS) algorithms to detect accurately the presence of the signals transmitted by licensed or primary users (PUs). Using a single SU SS can be problematic, especially in urban environments with many large obstacles that can fade or even block the reception of the PU signal. A solution for this is to use cooperative SS algorithms that assume to have more SUs collaborating for increasing the probability to detect the PU signal presence. Another component of the CR network is the fusion center (FC) that collects the individual detection information from SUs and based on this, it takes the final decision about the presence or absence of the PU signal. In this paper, we analyze a cooperative SS algorithm using a triple-threshold energy detection (ED) algorithm in each SU and a simple voting rule for the final decision at the FC node. We also investigate the cooperative SS detection performance dependence on the FC voting rule and an adaptive control mechanism for the intermediate detection threshold in each SU to minimize the global decision error probability (DEP).
{"title":"Triple- Threshold Energy Detection with Adaptive Intermediate Threshold for Cooperative Spectrum Sensing","authors":"O. Al-Dulaimi, Florin-Lucian Chiper, C. Vladeanu, Alexandru Martian","doi":"10.1109/comm54429.2022.9817328","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817328","url":null,"abstract":"In cognitive radio (CR) networks, the non-licensed users access dynamically the available resources with the requirement to avoid causing interference for the licensed users. Therefore, the non-licensed or secondary users (SUs) have to use spectrum sensing (SS) algorithms to detect accurately the presence of the signals transmitted by licensed or primary users (PUs). Using a single SU SS can be problematic, especially in urban environments with many large obstacles that can fade or even block the reception of the PU signal. A solution for this is to use cooperative SS algorithms that assume to have more SUs collaborating for increasing the probability to detect the PU signal presence. Another component of the CR network is the fusion center (FC) that collects the individual detection information from SUs and based on this, it takes the final decision about the presence or absence of the PU signal. In this paper, we analyze a cooperative SS algorithm using a triple-threshold energy detection (ED) algorithm in each SU and a simple voting rule for the final decision at the FC node. We also investigate the cooperative SS detection performance dependence on the FC voting rule and an adaptive control mechanism for the intermediate detection threshold in each SU to minimize the global decision error probability (DEP).","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817204
A. Glavan, V. Croitoru
The telecommunication sector is among the fast-growing industries with technological breakthroughs each couple of years. The main goals for businesses are customer experience improvement and lowering the overall costs of service delivery. In these settings, the business operations team confront increasingly more challenges in various forms: fast delivery protocols for new services, better support for production services and increase the value of the enterprise. Deployment environment assessment is paramount in the digital transformation of organizations all over the industry, not only because it ensures service continuity, but also because this could control the cloud resources costs. This paper proposes a solution that can be integrated in a smart automation architecture: unsupervised clustering for microservices deployment environment evaluation. The present paper presents a telecommunication setup, although the results are field-independent. The results section of the paper presents an evaluation of various unsupervised clustering models on public microservice time-series dataset.
{"title":"Cloud environment assessment using clustering techniques on microservices dataset","authors":"A. Glavan, V. Croitoru","doi":"10.1109/comm54429.2022.9817204","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817204","url":null,"abstract":"The telecommunication sector is among the fast-growing industries with technological breakthroughs each couple of years. The main goals for businesses are customer experience improvement and lowering the overall costs of service delivery. In these settings, the business operations team confront increasingly more challenges in various forms: fast delivery protocols for new services, better support for production services and increase the value of the enterprise. Deployment environment assessment is paramount in the digital transformation of organizations all over the industry, not only because it ensures service continuity, but also because this could control the cloud resources costs. This paper proposes a solution that can be integrated in a smart automation architecture: unsupervised clustering for microservices deployment environment evaluation. The present paper presents a telecommunication setup, although the results are field-independent. The results section of the paper presents an evaluation of various unsupervised clustering models on public microservice time-series dataset.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817333
Călin Bîră, Alexandru Rusu-Casandra
Raw spatial-objects radar data is scarce and hard to obtain, obstructing simulations and making improvements to the processing pipeline rather difficult. We provide such a radar dataset of five spatial objects, acquired using the Romania's first spatial-object tracking radar, the Cheia Radar. The dataset contains the tracking of five different objects for a few minutes, using 125W transmitting power and a 2-channel 16-bit 100MSa/s ADC for the receiver end. The input conditions/TLE and the output data format are described; the digital processing pipeline used to extract relevant data is specified so that other researchers may easily use the dataset, which is available on Microsoft Sharepoint.
{"title":"Dataset of Spatial Objects Acquired using Romania's First Ground-Based Space Tracking Radar","authors":"Călin Bîră, Alexandru Rusu-Casandra","doi":"10.1109/comm54429.2022.9817333","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817333","url":null,"abstract":"Raw spatial-objects radar data is scarce and hard to obtain, obstructing simulations and making improvements to the processing pipeline rather difficult. We provide such a radar dataset of five spatial objects, acquired using the Romania's first spatial-object tracking radar, the Cheia Radar. The dataset contains the tracking of five different objects for a few minutes, using 125W transmitting power and a 2-channel 16-bit 100MSa/s ADC for the receiver end. The input conditions/TLE and the output data format are described; the digital processing pipeline used to extract relevant data is specified so that other researchers may easily use the dataset, which is available on Microsoft Sharepoint.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817350
A. Aloman, M. Poveda-García, Ion Grecu, N. Druță, I. Nicolaescu
A leaky-wave (LW) feeder for non-parabolic reflectors is presented in this paper. It is based on a coaxial line with a helical periodic slot along it to achieve circular polarization and optimum reflector illumination. Full-wave simulation results show the high flexibility to control the radiation from the LW feeder by changing the slot width and periodicity. The design process, based on an in-house CAD tool to efficiently obtain the dimensions of the LW feeder given the desired radiation performance, is also presented. The obtained scanning range of the LW feeder from −90° to 10°, by changing the slot periodicity in the Ku-band at 11.85 GHz, shows the capability to adapt to different reflectors' shape. Efficiencies up to 90% are reported for the LW feeder, making this proposal very suitable for space applications.
{"title":"Analysis and Design of a Helical Leaky-Wave Antenna for Satellite Communications","authors":"A. Aloman, M. Poveda-García, Ion Grecu, N. Druță, I. Nicolaescu","doi":"10.1109/comm54429.2022.9817350","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817350","url":null,"abstract":"A leaky-wave (LW) feeder for non-parabolic reflectors is presented in this paper. It is based on a coaxial line with a helical periodic slot along it to achieve circular polarization and optimum reflector illumination. Full-wave simulation results show the high flexibility to control the radiation from the LW feeder by changing the slot width and periodicity. The design process, based on an in-house CAD tool to efficiently obtain the dimensions of the LW feeder given the desired radiation performance, is also presented. The obtained scanning range of the LW feeder from −90° to 10°, by changing the slot periodicity in the Ku-band at 11.85 GHz, shows the capability to adapt to different reflectors' shape. Efficiencies up to 90% are reported for the LW feeder, making this proposal very suitable for space applications.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127758991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817323
Robert Botez, Caralin-Marian Petruti, I. Ivanciu, V. Dobrota
Besides the well-known Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), another type of model has gained attention recently: Load Balancer as a Service (LBaaS). This is a common practice for public clouds, but it is not the case for private ones, where such a specific service must be developed in accordance with the needs and requirements of the organization. This paper presents Global Load Balancer (GLB), an innovative solution for implementing LBaaS in CLOUDUT, an academic private cloud infrastructure. We developed the service having in mind both the needs of the users exposing their applications to the Internet and the constraints related to the number of public IP addresses available in the university. Based on Kubernetes, GLB offers high-availability and enhanced security by employing secrets in the building phase of the Docker images. Our solution allows for updating routes on the fly, with the maximum downtime of one second as shown by experimental results. In case of node failure, we managed to reduce the downtime from approximately six minutes to less than one minute.
{"title":"Kubernetes- Based Load Balancer as a Service for Private Cloud Infrastructures","authors":"Robert Botez, Caralin-Marian Petruti, I. Ivanciu, V. Dobrota","doi":"10.1109/comm54429.2022.9817323","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817323","url":null,"abstract":"Besides the well-known Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), another type of model has gained attention recently: Load Balancer as a Service (LBaaS). This is a common practice for public clouds, but it is not the case for private ones, where such a specific service must be developed in accordance with the needs and requirements of the organization. This paper presents Global Load Balancer (GLB), an innovative solution for implementing LBaaS in CLOUDUT, an academic private cloud infrastructure. We developed the service having in mind both the needs of the users exposing their applications to the Internet and the constraints related to the number of public IP addresses available in the university. Based on Kubernetes, GLB offers high-availability and enhanced security by employing secrets in the building phase of the Docker images. Our solution allows for updating routes on the fly, with the maximum downtime of one second as shown by experimental results. In case of node failure, we managed to reduce the downtime from approximately six minutes to less than one minute.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"69 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130458819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817174
Ioan Duma, Teodora-Cristina Stoian, R. Dobre
Among numerous published research allowing loop make-up identification, the echo resolution problem still remains an open matter. The existing alternative algorithms are, unfortunately, slow to converge for most practical situations. Therefore, it is the object of this paper to give a proposed analytical model for the approach of the echo resolution, by using matrix spectral decomposition based on canonical diagonal form. The analysis of three types of subscriber loops (a loop with three sections, a non-homogeneous network with a bridged tap and a cascade of above-mentioned loops) represents the basic topic of this study, illustrated by simulation results and graphic representations.
{"title":"Backscattering Applications in Loop Make-Up Identification via Spectral Decomposition Methods","authors":"Ioan Duma, Teodora-Cristina Stoian, R. Dobre","doi":"10.1109/comm54429.2022.9817174","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817174","url":null,"abstract":"Among numerous published research allowing loop make-up identification, the echo resolution problem still remains an open matter. The existing alternative algorithms are, unfortunately, slow to converge for most practical situations. Therefore, it is the object of this paper to give a proposed analytical model for the approach of the echo resolution, by using matrix spectral decomposition based on canonical diagonal form. The analysis of three types of subscriber loops (a loop with three sections, a non-homogeneous network with a bridged tap and a cascade of above-mentioned loops) represents the basic topic of this study, illustrated by simulation results and graphic representations.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-16DOI: 10.1109/comm54429.2022.9817167
Gergely Hollósi
In ultra wideband (UWB) based localization and ranging systems, the main error source of ranging is the multi path effect on the timestamping process. However, in the literature it is widely assumed that the receive timestamp has some Gaussian distribution. The paper uses simulations featuring the recommended channel model of the IEEE 802.15.4a standard to investigate the distribution of the receive timestamps in dense office indoor environments. It is shown here that the distribution of receive timestamps is dissimilar to the Gaussian distribution, and the paper proposes a distribution applicable for probability inference methods.
{"title":"Distribution of ultra wideband (UWB) receive timestamps in dense indoor environment based on the Saleh-Valenzuela channel model","authors":"Gergely Hollósi","doi":"10.1109/comm54429.2022.9817167","DOIUrl":"https://doi.org/10.1109/comm54429.2022.9817167","url":null,"abstract":"In ultra wideband (UWB) based localization and ranging systems, the main error source of ranging is the multi path effect on the timestamping process. However, in the literature it is widely assumed that the receive timestamp has some Gaussian distribution. The paper uses simulations featuring the recommended channel model of the IEEE 802.15.4a standard to investigate the distribution of the receive timestamps in dense office indoor environments. It is shown here that the distribution of receive timestamps is dissimilar to the Gaussian distribution, and the paper proposes a distribution applicable for probability inference methods.","PeriodicalId":118077,"journal":{"name":"2022 14th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}