Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246279
S. Zoican, R. Zoican, D. Galatchi
This paper presents an implementation of an algorithm for finding the routes based on neural network using the Computer Unified Device Architecture (CUDA) that exploits the parallel processing nature of neural networks. The purpose of this paper is to investigate the possibility of an efficient implementation of such algorithm and evaluate its performance (processing time to determine the route). The implementation is not affected by the network topology so it may be used in dynamic networks. The resources required are the usual ones in a personal computer equipped with CUDA graphics card. Comparing with a standard implementation using a personal computer, the obtained performance is about hundred times better using CUDA.
{"title":"Neural network routing implementation using CUDA technology","authors":"S. Zoican, R. Zoican, D. Galatchi","doi":"10.1109/TELSKS.2017.8246279","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246279","url":null,"abstract":"This paper presents an implementation of an algorithm for finding the routes based on neural network using the Computer Unified Device Architecture (CUDA) that exploits the parallel processing nature of neural networks. The purpose of this paper is to investigate the possibility of an efficient implementation of such algorithm and evaluate its performance (processing time to determine the route). The implementation is not affected by the network topology so it may be used in dynamic networks. The resources required are the usual ones in a personal computer equipped with CUDA graphics card. Comparing with a standard implementation using a personal computer, the obtained performance is about hundred times better using CUDA.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246310
M. Medenica, D. Dihovicni
In this paper are presented the methods for security maintaining a web application. Beside fundamental aspects of security of ASP.NET application, also are presented the actions which are necessary to achieve required security, as well as security approach of the code in NET framework. It is shown the user authentication, windows verifying authenticity, and protection by using configuration file. The analysis of the definition of the rules of identification or authorization is maintained by means of tools of WAT, and then it is shown the manner in which displays a login page.
{"title":"Security point of view of Asp.Net application","authors":"M. Medenica, D. Dihovicni","doi":"10.1109/TELSKS.2017.8246310","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246310","url":null,"abstract":"In this paper are presented the methods for security maintaining a web application. Beside fundamental aspects of security of ASP.NET application, also are presented the actions which are necessary to achieve required security, as well as security approach of the code in NET framework. It is shown the user authentication, windows verifying authenticity, and protection by using configuration file. The analysis of the definition of the rules of identification or authorization is maintained by means of tools of WAT, and then it is shown the manner in which displays a login page.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246297
A. Atanasković, N. M. Ilić, Aleksandra Đorić
This paper presents the linearization of RF Doherty amplifier by the baseband signals for linearization whose adjustable parameters are adapted on required values in automated process. The signal for linearization is generated by digitally processing of I and Q components of the useful baseband signal forming in that manner the adequate second-order nonlinear signal required for linearization. The signals for linearization modified in amplitude and phase in the baseband modulate the fundamental carrier second harmonic and modulated signals are injected at the input and output of the transistor into the carrier cell of the Doherty configuration. DSP should adjust the amplitude and phase of the baseband signals for linearization in order to supress the third- and fifth-order intermodulation products. Process of the linearization coefficient setting and adaptation is performed automatically by minimizing power of the intermodulation products. The linearization results and effects of the linearization parameter adjustment and adaptation are considered for quadrature amplitude modulated signals characterized with different bandwidth up to 30 MHz, as well as for WCDMA and OFDM digitally modulated signals.
{"title":"Controlled coefficient adaptation in linearization of PA by modified baseband signal","authors":"A. Atanasković, N. M. Ilić, Aleksandra Đorić","doi":"10.1109/TELSKS.2017.8246297","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246297","url":null,"abstract":"This paper presents the linearization of RF Doherty amplifier by the baseband signals for linearization whose adjustable parameters are adapted on required values in automated process. The signal for linearization is generated by digitally processing of I and Q components of the useful baseband signal forming in that manner the adequate second-order nonlinear signal required for linearization. The signals for linearization modified in amplitude and phase in the baseband modulate the fundamental carrier second harmonic and modulated signals are injected at the input and output of the transistor into the carrier cell of the Doherty configuration. DSP should adjust the amplitude and phase of the baseband signals for linearization in order to supress the third- and fifth-order intermodulation products. Process of the linearization coefficient setting and adaptation is performed automatically by minimizing power of the intermodulation products. The linearization results and effects of the linearization parameter adjustment and adaptation are considered for quadrature amplitude modulated signals characterized with different bandwidth up to 30 MHz, as well as for WCDMA and OFDM digitally modulated signals.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246243
A. Jevremović, M. Veinovic, G. Shimic
The main challenge in the 20th century was to provide secure telecommunication services to professional users (military, police, security services, etc.) and to provide basic access to telecommunication services to private users (individuals and business organizations). A high level of security for private users was not important for many reasons: low risk, low performance devices, low level of technical knowledge, etc. In the 21st century, we have witnessed significant changes in this field. In the last few years, the real capabilities of government agencies became apparent in the field of information security, showning themselves to be woefully lacking, and failing to adequately respond to new challenges. The trend of moving security services focus to mass surveillance, combined with the inability to keep these functions solely in the hands of authorized agencies, is concerning. For private users, an even more serious transformation is happening. The number of people using telecommunication services is rapidly growing, as well as the intensity of using these services. That also implies the reduction of the average technical knowledge of users, which further requires simplified user interfaces for these services. Additionally, the value of the content in these communications is growing and becoming more complex. To survive in the market, the companies that produce telecommunication devices are forced to introduce new features as quickly as possible. The security aspect is, in most cases, seriously considered only after serious incidents occur. Additionally, those companies sometime intentionally break user's privacy and security in order to attain a better position in the market, and to increase their profit, alone or in cooperation with government security services. In this paper we tried to make an overview of the current state in the aforementioned security aspects, and to refer readers to current problems.
{"title":"An overview of current security and privacy issues in modern telecommunications","authors":"A. Jevremović, M. Veinovic, G. Shimic","doi":"10.1109/TELSKS.2017.8246243","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246243","url":null,"abstract":"The main challenge in the 20th century was to provide secure telecommunication services to professional users (military, police, security services, etc.) and to provide basic access to telecommunication services to private users (individuals and business organizations). A high level of security for private users was not important for many reasons: low risk, low performance devices, low level of technical knowledge, etc. In the 21st century, we have witnessed significant changes in this field. In the last few years, the real capabilities of government agencies became apparent in the field of information security, showning themselves to be woefully lacking, and failing to adequately respond to new challenges. The trend of moving security services focus to mass surveillance, combined with the inability to keep these functions solely in the hands of authorized agencies, is concerning. For private users, an even more serious transformation is happening. The number of people using telecommunication services is rapidly growing, as well as the intensity of using these services. That also implies the reduction of the average technical knowledge of users, which further requires simplified user interfaces for these services. Additionally, the value of the content in these communications is growing and becoming more complex. To survive in the market, the companies that produce telecommunication devices are forced to introduce new features as quickly as possible. The security aspect is, in most cases, seriously considered only after serious incidents occur. Additionally, those companies sometime intentionally break user's privacy and security in order to attain a better position in the market, and to increase their profit, alone or in cooperation with government security services. In this paper we tried to make an overview of the current state in the aforementioned security aspects, and to refer readers to current problems.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246235
B. Jokanović, V. Milosevic, M. Radovanovic, N. Bošković
Millimeter wave multibeam antennas are a key technology for enabling beamforming and massive multiple-input multiple-output (MIMO) infrastructure for the fifth generation wireless access (5G). They have attracted a great research attention nowadays and have been intensively investigated in order to achieve previously unattainable system performances. Here we present an overview of the recent advances in multibeam antenna designs based on reflectors, lenses and beamforming networks. We have discussed their principle of operation, design and implementation as well as suitability for the future 5G massive MIMO systems.
{"title":"Advanced antennas for next generation wireless access","authors":"B. Jokanović, V. Milosevic, M. Radovanovic, N. Bošković","doi":"10.1109/TELSKS.2017.8246235","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246235","url":null,"abstract":"Millimeter wave multibeam antennas are a key technology for enabling beamforming and massive multiple-input multiple-output (MIMO) infrastructure for the fifth generation wireless access (5G). They have attracted a great research attention nowadays and have been intensively investigated in order to achieve previously unattainable system performances. Here we present an overview of the recent advances in multibeam antenna designs based on reflectors, lenses and beamforming networks. We have discussed their principle of operation, design and implementation as well as suitability for the future 5G massive MIMO systems.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246227
E. Pencheva
Multi-access Edge Computing (MEC) provides an environment with distributed cloud capabilities in the Radio Access Network. The vicinity to end users enables deployment of optimized services with minimum latency and location-based multimedia broadcasting. This paper studies functional aspects of deployment of Parlay X message broadcast Web Service in MEC environment.
{"title":"Multimedia broadcasting in multi-access edge computing","authors":"E. Pencheva","doi":"10.1109/TELSKS.2017.8246227","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246227","url":null,"abstract":"Multi-access Edge Computing (MEC) provides an environment with distributed cloud capabilities in the Radio Access Network. The vicinity to end users enables deployment of optimized services with minimum latency and location-based multimedia broadcasting. This paper studies functional aspects of deployment of Parlay X message broadcast Web Service in MEC environment.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246299
T. Dimitrijević, J. Joković, N. Dončov, B. Milovanovic, M. Kostić
This paper deals with TLM modelling issues mostly pertaining to create the model, mesh adjustments, and simulation efficiency on an example of a cylindrical-rectangular coax-fed microstrip patch antenna. Possibilities, advantages, and limitations of the TLM solvers based on cylindrical and rectangular coordinate systems are investigated through simulations and discussed in detail.
{"title":"Consideration of TLM modelling on example of cylindrical rectangular microstrip antenna","authors":"T. Dimitrijević, J. Joković, N. Dončov, B. Milovanovic, M. Kostić","doi":"10.1109/TELSKS.2017.8246299","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246299","url":null,"abstract":"This paper deals with TLM modelling issues mostly pertaining to create the model, mesh adjustments, and simulation efficiency on an example of a cylindrical-rectangular coax-fed microstrip patch antenna. Possibilities, advantages, and limitations of the TLM solvers based on cylindrical and rectangular coordinate systems are investigated through simulations and discussed in detail.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132698544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246252
S. Birgermajer, N. Janković, V. Crnojević-Bengin, M. Bozzi, V. Radonić
In this paper, we propose a novel 0 dB forward-wave coupler realized in microstrip-ridge gap waveguide technology. The coupler is based on two microstrip-ridges coupled through an array of mushroom inclusions. A detailed design procedure is presented including the design of the hosting PMC structure, microstrip-ridge and the coupler. The proposed structure represents the first forward-wave coupler realized in gap waveguide technology. It is characterized by high coupling level of 0.3 dB at 13.54 GHz, and the 0.48 dB coupling variance over the bandwidth of 26%. Also, good performances in terms of the isolation and directivity have been achieved.
{"title":"Forward-wave 0 dB directional coupler based on microstrip-ridge gap waveguide technology","authors":"S. Birgermajer, N. Janković, V. Crnojević-Bengin, M. Bozzi, V. Radonić","doi":"10.1109/TELSKS.2017.8246252","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246252","url":null,"abstract":"In this paper, we propose a novel 0 dB forward-wave coupler realized in microstrip-ridge gap waveguide technology. The coupler is based on two microstrip-ridges coupled through an array of mushroom inclusions. A detailed design procedure is presented including the design of the hosting PMC structure, microstrip-ridge and the coupler. The proposed structure represents the first forward-wave coupler realized in gap waveguide technology. It is characterized by high coupling level of 0.3 dB at 13.54 GHz, and the 0.48 dB coupling variance over the bandwidth of 26%. Also, good performances in terms of the isolation and directivity have been achieved.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246276
L. Gavrilovska, V. Rakovic, Aleksandar Ichkov, Davor Todorovski, Simona Marinova
Conventional radio access networks are designed to utilize static configuration and are statically deployed. As results they are inefficient in handling any spatio-temporal fluctuations of the underlying traffic demand. Cloud-RAN represents a novel centralized technology based on softwareization and virtualization technology that can efficiently address the problems of legacy networks. Cloud-RAN facilitates high data rates as well as high network and radio adaptability across the software defined wireless networks. This paper elaborates the CRAN concept providing overview of current status, relevant features and research challenges related to it. Moreover, the paper presents a developed demo platform capable of efficient virtualization of different types of wireless technologies that belong to a heterogeneous wireless environment. It utilizes commercial and open-source solutions, such as OpenStack and SDR software. The performance analysis highlights the behavior of GSM and LTE technologies, with respect to cloud resource allocation. The paper also discusses some aspects and technical requirements for a C-RAN based dynamical resource allocation.
{"title":"Flexible C-RAN: Radio technology for 5G","authors":"L. Gavrilovska, V. Rakovic, Aleksandar Ichkov, Davor Todorovski, Simona Marinova","doi":"10.1109/TELSKS.2017.8246276","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246276","url":null,"abstract":"Conventional radio access networks are designed to utilize static configuration and are statically deployed. As results they are inefficient in handling any spatio-temporal fluctuations of the underlying traffic demand. Cloud-RAN represents a novel centralized technology based on softwareization and virtualization technology that can efficiently address the problems of legacy networks. Cloud-RAN facilitates high data rates as well as high network and radio adaptability across the software defined wireless networks. This paper elaborates the CRAN concept providing overview of current status, relevant features and research challenges related to it. Moreover, the paper presents a developed demo platform capable of efficient virtualization of different types of wireless technologies that belong to a heterogeneous wireless environment. It utilizes commercial and open-source solutions, such as OpenStack and SDR software. The performance analysis highlights the behavior of GSM and LTE technologies, with respect to cloud resource allocation. The paper also discusses some aspects and technical requirements for a C-RAN based dynamical resource allocation.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TELSKS.2017.8246281
Srdjan Durkovic, Zoran Čiča
The development of new services and increase of the number of users lead to the Internet traffic growth. In order to efficiently keep up with the Internet growth, packet switches must improve their performances in order to support increased amount of traffic at greater speeds. One of the most popular packet switch solutions are Load-Balanced Birkhoff-von Neumann (LB-BvN) packet switches, because of their very simple hardware implementation. Packet switches should also support fair service of user flows during the temporary congestion in the network. In this paper, we propose a novel switch based on the LB-BvN architecture that achieves better performance in terms of fair service compared to existing LB-BvN switches. The proposed switch is compared to other LB-BvN based switches, in terms of average packet delay and fair service.
{"title":"Load balanced Birkhoff-von Neumann switch with output congestion detection","authors":"Srdjan Durkovic, Zoran Čiča","doi":"10.1109/TELSKS.2017.8246281","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246281","url":null,"abstract":"The development of new services and increase of the number of users lead to the Internet traffic growth. In order to efficiently keep up with the Internet growth, packet switches must improve their performances in order to support increased amount of traffic at greater speeds. One of the most popular packet switch solutions are Load-Balanced Birkhoff-von Neumann (LB-BvN) packet switches, because of their very simple hardware implementation. Packet switches should also support fair service of user flows during the temporary congestion in the network. In this paper, we propose a novel switch based on the LB-BvN architecture that achieves better performance in terms of fair service compared to existing LB-BvN switches. The proposed switch is compared to other LB-BvN based switches, in terms of average packet delay and fair service.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}