Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631253
Nuyya O, Sergeeva E, Khomenko A
This research provides a modeling, simulation and implementation of a low-scale poultry farm control system. The device is cheap and effective option for low-scale farms. It is proposed to control microclimate in most productive and effective way, and minimize the manual labor on the low-scale poultry farm. Based on the results of mathematical modeling of the low-scale poultry farm's microclimate, this device is designed for automatic control of temperature, humidity and air pollution. It also controls the intermittent lighting according to the most efficiency schedule.
{"title":"Modeling, simulation and implementation of $pmb{a}$ low- scale poultry farm control system","authors":"Nuyya O, Sergeeva E, Khomenko A","doi":"10.1109/ICUMT.2018.8631253","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631253","url":null,"abstract":"This research provides a modeling, simulation and implementation of a low-scale poultry farm control system. The device is cheap and effective option for low-scale farms. It is proposed to control microclimate in most productive and effective way, and minimize the manual labor on the low-scale poultry farm. Based on the results of mathematical modeling of the low-scale poultry farm's microclimate, this device is designed for automatic control of temperature, humidity and air pollution. It also controls the intermittent lighting according to the most efficiency schedule.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114401178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631247
M. Seda, Pavel Seda
In this paper, we deal with a problem of finding the shortest interconnection of points given in a Euclidean plane. The traditional strategy starts from the complete graph and finds its minimum spanning tree. However, this approach is proportional to the second power of the number of vertices, and, therefore, not very efficient. Additionally, if, instead of minimum spanning trees, minimum Steiner trees are considered, then the total length of the final network is decreased. Since the Steiner tree problem is NP-hard, in the case of large instances, heuristics must be used. Here, we propose a Delaunay triangulation-based deterministic heuristic and show that it gives very good results in short times.
{"title":"Minimisation of Networks Based on Computational Geometry Data Structures","authors":"M. Seda, Pavel Seda","doi":"10.1109/ICUMT.2018.8631247","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631247","url":null,"abstract":"In this paper, we deal with a problem of finding the shortest interconnection of points given in a Euclidean plane. The traditional strategy starts from the complete graph and finds its minimum spanning tree. However, this approach is proportional to the second power of the number of vertices, and, therefore, not very efficient. Additionally, if, instead of minimum spanning trees, minimum Steiner trees are considered, then the total length of the final network is decreased. Since the Steiner tree problem is NP-hard, in the case of large instances, heuristics must be used. Here, we propose a Delaunay triangulation-based deterministic heuristic and show that it gives very good results in short times.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631203
C. Bouras, Georgios Diles, Dimitrios Ntoutsos
The evolution of the fifth generation (5G) of mobile networks tends towards the prevalence of dense femtocell deployments, which offer improvements in data rate and overall network's capacity. Small cell deployments and particularly fem- tocells provide an attractive, cheap and flexible solution for the increased traffic demand. However, the resulting dense networks are characterized by challenges, too, such as increased interference and resource allocation. In this paper, we propose ways to address these difficulties by combining hybrid access, sleep mode and a power control mechanism. Simulations show that the above mechanism leads to improved capacity and throughput for subscribers, along with improved energy efficiency, without compromising the non-subscribers performance.
{"title":"Sleep Mode Strategies for Dense Small Cell 5G Networks","authors":"C. Bouras, Georgios Diles, Dimitrios Ntoutsos","doi":"10.1109/ICUMT.2018.8631203","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631203","url":null,"abstract":"The evolution of the fifth generation (5G) of mobile networks tends towards the prevalence of dense femtocell deployments, which offer improvements in data rate and overall network's capacity. Small cell deployments and particularly fem- tocells provide an attractive, cheap and flexible solution for the increased traffic demand. However, the resulting dense networks are characterized by challenges, too, such as increased interference and resource allocation. In this paper, we propose ways to address these difficulties by combining hybrid access, sleep mode and a power control mechanism. Simulations show that the above mechanism leads to improved capacity and throughput for subscribers, along with improved energy efficiency, without compromising the non-subscribers performance.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129664436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631212
S. Grabovsky, P. Cika, V. Zeman, V. Clupek, Milan Svehlak, J. Klimeš
Cyber attacks are currently a major threat to individuals as well as businesses or institutions. Denial of service (DoS) attacks are very common cyber attacks that focuses on availability of network services or network devices. This paper deals with developing of new modules of DoS attacks and network traffic generator into Apache JMeter that is designed to load test functional behavior and measure performance. Modules developed together with Appache JMeter tool can test a network infrastructure and find weak localities prone to DoS cyber attacks. One goal of this paper is to compare tools for stress testing of web servers and services. The network generator module of DoS attacks allows stress testing of networks based on the Transmission Control Protocol/Internet Protocol (TCP/.IP). With using the generator developed it is possible to test the availability of network devices when exposure to DoS attacks. Selected cyber attacks targeting on the availability of network resources (DoS attacks) that can test a resistance of a network infrastructure are described in the article. DoS attacks described have been implemented in the Apache JMeter tool together with the design and the development of the network generator of DoS attacks. New modules can be used to test a resistance of network infrastructure. Finally, the measured values using the generator developed are presented and discussed.
{"title":"Denial of Service Attack Generator in Apache JMeter","authors":"S. Grabovsky, P. Cika, V. Zeman, V. Clupek, Milan Svehlak, J. Klimeš","doi":"10.1109/ICUMT.2018.8631212","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631212","url":null,"abstract":"Cyber attacks are currently a major threat to individuals as well as businesses or institutions. Denial of service (DoS) attacks are very common cyber attacks that focuses on availability of network services or network devices. This paper deals with developing of new modules of DoS attacks and network traffic generator into Apache JMeter that is designed to load test functional behavior and measure performance. Modules developed together with Appache JMeter tool can test a network infrastructure and find weak localities prone to DoS cyber attacks. One goal of this paper is to compare tools for stress testing of web servers and services. The network generator module of DoS attacks allows stress testing of networks based on the Transmission Control Protocol/Internet Protocol (TCP/.IP). With using the generator developed it is possible to test the availability of network devices when exposure to DoS attacks. Selected cyber attacks targeting on the availability of network resources (DoS attacks) that can test a resistance of a network infrastructure are described in the article. DoS attacks described have been implemented in the Apache JMeter tool together with the design and the development of the network generator of DoS attacks. New modules can be used to test a resistance of network infrastructure. Finally, the measured values using the generator developed are presented and discussed.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"48 15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121185621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631219
K. Jindal, R. Upadhyay, Hari Shankar Singh
Electroencephalogram signals are often contaminated by non-cerebral sources like muscle artifacts, eye movement and instrumentation noise due to which cerebral information loss occurs and interpretation of signals become challenging. This paper presents a novel noise suppression and artifact removal technique for Electroencephalogram signal records. The proposed hybrid technique is based on joint usage of Fast-Power ICA and General Linear Chirplet Transform. In present work, to separate blind sources of contaminated Electroencephalogram activity Fast-Power ICA technique is employed. Further, Artifactual Independent Components are identified and corrected by GLCT transformation technique. The efficacy of proposed work is estimated on simulated Electroencephalogram signals by qualitative evaluation. The results demonstrate that proposed artifact and noise suppression technique is capable of identifying non-cerebral sources of artifact present in Electroencephalogram activity. Also, it effectively removes such sources from recorded Electroencephalogram activity and makes signals contamination free.
{"title":"Eeg Artifact Removal and Noise Suppression Using Hybrid Glct -Ica Technique","authors":"K. Jindal, R. Upadhyay, Hari Shankar Singh","doi":"10.1109/ICUMT.2018.8631219","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631219","url":null,"abstract":"Electroencephalogram signals are often contaminated by non-cerebral sources like muscle artifacts, eye movement and instrumentation noise due to which cerebral information loss occurs and interpretation of signals become challenging. This paper presents a novel noise suppression and artifact removal technique for Electroencephalogram signal records. The proposed hybrid technique is based on joint usage of Fast-Power ICA and General Linear Chirplet Transform. In present work, to separate blind sources of contaminated Electroencephalogram activity Fast-Power ICA technique is employed. Further, Artifactual Independent Components are identified and corrected by GLCT transformation technique. The efficacy of proposed work is estimated on simulated Electroencephalogram signals by qualitative evaluation. The results demonstrate that proposed artifact and noise suppression technique is capable of identifying non-cerebral sources of artifact present in Electroencephalogram activity. Also, it effectively removes such sources from recorded Electroencephalogram activity and makes signals contamination free.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116519887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631218
A. Ovsyannikova, S. Zavjalov, S. Volvenko
This work is dedicated to researching the influence of the optimization parameter (correlation coefficient) which determines bit-error rate (BER) performance of optimal signals on their spectral and energy efficiency. Optimal envelope shapes, corresponding energy spectra and BER performance curves are presented for different limitations. Occupied frequency bandwidth and energy losses are considered. Values of correlation coefficient providing energy losses no more than 0.5 dB for error probability 10−3are obtained. The value of correlation coefficient which decrease is not efficient in terms of approaching to the Shannon limit is found.
{"title":"Influence of Correlation Coefficient on Spectral and Energy Efficiency of Optimal Signals","authors":"A. Ovsyannikova, S. Zavjalov, S. Volvenko","doi":"10.1109/ICUMT.2018.8631218","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631218","url":null,"abstract":"This work is dedicated to researching the influence of the optimization parameter (correlation coefficient) which determines bit-error rate (BER) performance of optimal signals on their spectral and energy efficiency. Optimal envelope shapes, corresponding energy spectra and BER performance curves are presented for different limitations. Occupied frequency bandwidth and energy losses are considered. Values of correlation coefficient providing energy losses no more than 0.5 dB for error probability 10−3are obtained. The value of correlation coefficient which decrease is not efficient in terms of approaching to the Shannon limit is found.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123796713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631237
Pavel Seda, Pavel Mašek, Jindriska Sedova, M. Seda, Jan Krejci, Jiri Hosek
With the increasing popularity of Software as a Service (SaaS) clouds, software architects face new challenges in software architecture design, e.g. efficiently integrating those chosen web services into clouds. In this respect, early quality evaluation of the designed SaaS cloud application is crucial to mitigate the risk of later architectural changes due to a violation of quality requirements (such as response time, network throughput and scalability). Architects need to navigate in a rich set of offered services, a variability of the SaaS cloud environments, which makes it difficult to predict the general approach without time-consuming implementation of application prototypes (using GraphQL, Representational State Transfer (REST), Simple Object Access Protocol (SOAP), and Application Programming Interfaces (APIs) approaches). In this paper, we present an abstract application model designed to select the details with a high level of scalability and efficient interactions between service components. This model is reusable and provides new way of thinking about cloud architecture.
随着软件即服务(SaaS)云的日益普及,软件架构师在软件架构设计方面面临着新的挑战,例如,如何有效地将所选择的web服务集成到云中。在这方面,设计的SaaS云应用程序的早期质量评估对于降低由于违反质量需求(如响应时间、网络吞吐量和可伸缩性)而导致的后期体系结构更改的风险至关重要。架构师需要在一组丰富的提供服务中导航,这是SaaS云环境的可变性,这使得很难在不耗时地实现应用程序原型(使用GraphQL、Representational State Transfer (REST)、Simple Object Access Protocol (SOAP)和application Programming Interfaces (api)方法)的情况下预测通用方法。在本文中,我们提出了一个抽象的应用程序模型,旨在选择具有高水平可伸缩性和服务组件之间有效交互的细节。该模型是可重用的,并提供了思考云架构的新方法。
{"title":"Efficient Architecture Design for Software as a Service in Cloud Environments","authors":"Pavel Seda, Pavel Mašek, Jindriska Sedova, M. Seda, Jan Krejci, Jiri Hosek","doi":"10.1109/ICUMT.2018.8631237","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631237","url":null,"abstract":"With the increasing popularity of Software as a Service (SaaS) clouds, software architects face new challenges in software architecture design, e.g. efficiently integrating those chosen web services into clouds. In this respect, early quality evaluation of the designed SaaS cloud application is crucial to mitigate the risk of later architectural changes due to a violation of quality requirements (such as response time, network throughput and scalability). Architects need to navigate in a rich set of offered services, a variability of the SaaS cloud environments, which makes it difficult to predict the general approach without time-consuming implementation of application prototypes (using GraphQL, Representational State Transfer (REST), Simple Object Access Protocol (SOAP), and Application Programming Interfaces (APIs) approaches). In this paper, we present an abstract application model designed to select the details with a high level of scalability and efficient interactions between service components. This model is reusable and provides new way of thinking about cloud architecture.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127241033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631217
A. Burkov, A. Frolov, A. Turlikov
The article deals with the random multiple access algorithm using orthogonal preambles. This algorithm utilizes mechanism of temporal switching to time division mode in the case when several users transmit in one time-frequency resource. This approach allows to resolve the “conflict” without using the random-access procedure. The simulation results for the proposed algorithm, as well as its numerical analysis, are presented. We show, that this algorithm allows increasing the maximum throughput in the random multiple access mode. We showed the effect of the number of orthogonal preambles and the probability of sending a message to the channel for the efficiency of the algorithm.
{"title":"Contention-Based Protocol with Time Division Collision Resolution","authors":"A. Burkov, A. Frolov, A. Turlikov","doi":"10.1109/ICUMT.2018.8631217","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631217","url":null,"abstract":"The article deals with the random multiple access algorithm using orthogonal preambles. This algorithm utilizes mechanism of temporal switching to time division mode in the case when several users transmit in one time-frequency resource. This approach allows to resolve the “conflict” without using the random-access procedure. The simulation results for the proposed algorithm, as well as its numerical analysis, are presented. We show, that this algorithm allows increasing the maximum throughput in the random multiple access mode. We showed the effect of the number of orthogonal preambles and the probability of sending a message to the channel for the efficiency of the algorithm.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130768659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631216
A. Zeifman, K. Kiseleva, Y. Satin, Anastasia Kryukova, V. Korolev
New classes of finite Markovian queueing models with possible batch arrivals and/or group services are studied. We obtain bounds on the rate of convergence for these models and compute the limiting characteristics for a specific non-stationary model.
{"title":"On a Method of Bounding the Rate of Convergence for Finite Markovian Queues","authors":"A. Zeifman, K. Kiseleva, Y. Satin, Anastasia Kryukova, V. Korolev","doi":"10.1109/ICUMT.2018.8631216","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631216","url":null,"abstract":"New classes of finite Markovian queueing models with possible batch arrivals and/or group services are studied. We obtain bounds on the rate of convergence for these models and compute the limiting characteristics for a specific non-stationary model.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133874760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631211
Abubaker-Matovu Waswa, Stephen S. Mwanje, Jens Mückenheim, A. Mitschele-Thiel
The third generation partnership project (3GPP) initiative to integrate device-to-device (D2D) communication within the cellular networks is premised on the high spectral efficiency gains during spectrum sharing and user quality of service (QoS) guarantees. However, the intra-cell interference between D2D and cellular users during spectrum sharing must be controlled to realize these gains in the network. In this paper, we formulate and propose two novel algorithms for the selection of multiple D2D users allowed to share radio resources already scheduled by the base station (BS) for a given cellular user. All users (i.e. the cellular and selected D2D users) distributively determine their transmit power based on a fixed target signal-to-noise ratio (SNR). Thereafter, the BS chooses suitable multiple D2D users that are allowed to share a given cellular user's radio resources using a distance-based selection criteria. Our results show increased total cell spectral efficiency with both algorithms while all users have better guarantees of achieving their QoS requirements with only one of the algorithms.
{"title":"Opportunistic and Partial Random Resource Reuse for Multiple D2D Communication in Cellular Networks","authors":"Abubaker-Matovu Waswa, Stephen S. Mwanje, Jens Mückenheim, A. Mitschele-Thiel","doi":"10.1109/ICUMT.2018.8631211","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631211","url":null,"abstract":"The third generation partnership project (3GPP) initiative to integrate device-to-device (D2D) communication within the cellular networks is premised on the high spectral efficiency gains during spectrum sharing and user quality of service (QoS) guarantees. However, the intra-cell interference between D2D and cellular users during spectrum sharing must be controlled to realize these gains in the network. In this paper, we formulate and propose two novel algorithms for the selection of multiple D2D users allowed to share radio resources already scheduled by the base station (BS) for a given cellular user. All users (i.e. the cellular and selected D2D users) distributively determine their transmit power based on a fixed target signal-to-noise ratio (SNR). Thereafter, the BS chooses suitable multiple D2D users that are allowed to share a given cellular user's radio resources using a distance-based selection criteria. Our results show increased total cell spectral efficiency with both algorithms while all users have better guarantees of achieving their QoS requirements with only one of the algorithms.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121143797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}