Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710110
Radhika Gour, Anshul Tyagi
Device-to-Device (D2D) communication has proven as a candidate solution for offloading the data traffic and improving spectrum efficiency of cellular communication systems. It allows the terminals to communicate directly without increasing the load on the base station (BS). Underlay D2D is adopted in our work because it is more spectrum efficient due to channel sharing among cellular user (CU) and D2D pair. This kind of sharing is beneficial only when appropriate resource management is done otherwise it causes harmful interferences too. This work introduces an efficient and simple method to find multiple CUs as reuse partners for each D2D pair. After the selection of channels, power control is applied by means of convex optimization for D2D pairs to control the interference at the BS. The objective of the work is to maximize the D2D sum-rate without affecting CU's performance. The proposed scheme is then compared with existing pairing algorithms named as Hungarian also known as Kuhn-Munkres (KM) and IPPO algorithms and performance gain is verified through simulation results.
{"title":"QoS Aware Channel Selection and Power Allocation for Device-to-Device Communication","authors":"Radhika Gour, Anshul Tyagi","doi":"10.1109/ANTS.2018.8710110","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710110","url":null,"abstract":"Device-to-Device (D2D) communication has proven as a candidate solution for offloading the data traffic and improving spectrum efficiency of cellular communication systems. It allows the terminals to communicate directly without increasing the load on the base station (BS). Underlay D2D is adopted in our work because it is more spectrum efficient due to channel sharing among cellular user (CU) and D2D pair. This kind of sharing is beneficial only when appropriate resource management is done otherwise it causes harmful interferences too. This work introduces an efficient and simple method to find multiple CUs as reuse partners for each D2D pair. After the selection of channels, power control is applied by means of convex optimization for D2D pairs to control the interference at the BS. The objective of the work is to maximize the D2D sum-rate without affecting CU's performance. The proposed scheme is then compared with existing pairing algorithms named as Hungarian also known as Kuhn-Munkres (KM) and IPPO algorithms and performance gain is verified through simulation results.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115292142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710127
Sukriti Garg, M. Aggarwal, A. Dixit
Evolution in passive optical access networks concentrate on increasing their capacity that can be in terms of the number of users served or the data rates served per user. Various techniques have been under consideration to achieve the same. Their names are first generation passive optical networks (PON), next generation-1 PON (NG-PON1), and next generation 2 PON (NG-PON2). However, none of them has proven to be the most efficient solution for every scenario (such as power, cost and reach efficiency). This calls for the evaluation of the existing PON architectures and provide an optimum solution. In this work, we evaluate the performance of Gigabit-capable PON (GPON), XG-PON, XLG-PON, wavelength division multiplexing PON (WDM-PON), and time and wavelength division multiplex PON (TWDM-PON) architectures in terms of their reach, cost and power consumption. On analyzing these architectures in OptSim software, we found that WDM-PON is an optimum solution for long reach and high data rate PON system if we neglect the cost constraint. Furthermore, for the cost effective solution, TWDM-PON fits best in terms of high data rate and low power consumption but provides lower reach in comparison to WDM-PON.
{"title":"Power, Cost and Reach Based Evaluation of Next Generation Passive Optical Networks Architectures","authors":"Sukriti Garg, M. Aggarwal, A. Dixit","doi":"10.1109/ANTS.2018.8710127","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710127","url":null,"abstract":"Evolution in passive optical access networks concentrate on increasing their capacity that can be in terms of the number of users served or the data rates served per user. Various techniques have been under consideration to achieve the same. Their names are first generation passive optical networks (PON), next generation-1 PON (NG-PON1), and next generation 2 PON (NG-PON2). However, none of them has proven to be the most efficient solution for every scenario (such as power, cost and reach efficiency). This calls for the evaluation of the existing PON architectures and provide an optimum solution. In this work, we evaluate the performance of Gigabit-capable PON (GPON), XG-PON, XLG-PON, wavelength division multiplexing PON (WDM-PON), and time and wavelength division multiplex PON (TWDM-PON) architectures in terms of their reach, cost and power consumption. On analyzing these architectures in OptSim software, we found that WDM-PON is an optimum solution for long reach and high data rate PON system if we neglect the cost constraint. Furthermore, for the cost effective solution, TWDM-PON fits best in terms of high data rate and low power consumption but provides lower reach in comparison to WDM-PON.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115688046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710105
Jinita Patel, M. Das, Sukumar Nandi
With the rapid growth in the automobile industry and the advancement in the embedded technology, the traditional mechanical key for operating vehicles is gradually replaced by Remote Keyless Entry (RKE) system. Enabling RKE system in vehicles not only improves the security of car access but also facilitates convenience to users. At the same time, RKE system introduces many threats such as eavesdropping, relay, replay attack, On-board Diagnostic (OBD) port scan attack, key fob cloning, jamming and so on. In this paper, we discuss on the keyless car entry system, observe some security weaknesses in a recent RKE system and present a new RKE system. The proposed RKE system uses the notion of unclonable security module to minimize the OBD port scan attack including other known threats. The proposed RKE system achieves authentication of car as well as key fob by preserving privacy of the communicating entities. The security analysis and experimental results show that the proposed RKE system is secure and practical with respect to efficiency and user convenience.
{"title":"On the Security of Remote Key Less Entry for Vehicles","authors":"Jinita Patel, M. Das, Sukumar Nandi","doi":"10.1109/ANTS.2018.8710105","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710105","url":null,"abstract":"With the rapid growth in the automobile industry and the advancement in the embedded technology, the traditional mechanical key for operating vehicles is gradually replaced by Remote Keyless Entry (RKE) system. Enabling RKE system in vehicles not only improves the security of car access but also facilitates convenience to users. At the same time, RKE system introduces many threats such as eavesdropping, relay, replay attack, On-board Diagnostic (OBD) port scan attack, key fob cloning, jamming and so on. In this paper, we discuss on the keyless car entry system, observe some security weaknesses in a recent RKE system and present a new RKE system. The proposed RKE system uses the notion of unclonable security module to minimize the OBD port scan attack including other known threats. The proposed RKE system achieves authentication of car as well as key fob by preserving privacy of the communicating entities. The security analysis and experimental results show that the proposed RKE system is secure and practical with respect to efficiency and user convenience.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115716997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710051
Shilpi Varshney, Shreya Tyagi, B. Sainath
As we progress towards the fifth generation (5G) wireless systems to meet the data rate requirements, it becomes difficult for the conventional cellular networks to provide connectivity in the uplink to a huge number of connected devices. Hence, the adoption of the millimeter wave (mmWave) technology will ease the integration of IoT devices into the 5G cellular network. In this paper, we consider a stochastic geometry model to investigate baseline Random Access scheme’s success probability in the Internet of things (IoT) that uses millimeter wave (mmWave) cellular communication technology. Specifically, to obtain novel insights, we analyze probability of success of the random access scheme in the following three scenarios: i) Success probability as a function of the signal power-to-noise ratio (SNR), ii) Success probability as a function of the signal power-to-interference ratio (SIR), and iii) Success probability in terms of signal power-to-interference plus noise ratio (SINR). Furthermore, we approximate the probability of success in LOS region using a simplified ball model for a large number of IoT devices. Using Monte Carlo simulations, the approximation of LOS-ball comes out to be sufficiently accurate with the analytical results for typical IoT intensity.
{"title":"Novel Insights into Probability of Success of Random Access Scheme in 5G Millimeter Wave Cellular Network","authors":"Shilpi Varshney, Shreya Tyagi, B. Sainath","doi":"10.1109/ANTS.2018.8710051","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710051","url":null,"abstract":"As we progress towards the fifth generation (5G) wireless systems to meet the data rate requirements, it becomes difficult for the conventional cellular networks to provide connectivity in the uplink to a huge number of connected devices. Hence, the adoption of the millimeter wave (mmWave) technology will ease the integration of IoT devices into the 5G cellular network. In this paper, we consider a stochastic geometry model to investigate baseline Random Access scheme’s success probability in the Internet of things (IoT) that uses millimeter wave (mmWave) cellular communication technology. Specifically, to obtain novel insights, we analyze probability of success of the random access scheme in the following three scenarios: i) Success probability as a function of the signal power-to-noise ratio (SNR), ii) Success probability as a function of the signal power-to-interference ratio (SIR), and iii) Success probability in terms of signal power-to-interference plus noise ratio (SINR). Furthermore, we approximate the probability of success in LOS region using a simplified ball model for a large number of IoT devices. Using Monte Carlo simulations, the approximation of LOS-ball comes out to be sufficiently accurate with the analytical results for typical IoT intensity.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121077821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710104
Dony J. Muttath, M. Santhoshkumar, K. Premkumar
We consider a problem of scheduling packets in a fading link where each packet is required to reach the destination before a delay deadline. Time is slotted, and at the beginning of each slot, a packet arrives according to an arrival process. A packet on arrival is stored in a buffer, and it is required to reach the destination before a total delay of $d+ 1$ slots (i.e., the maximum waiting time in the buffer can be d time-slots and one time-slot delay for transmission). At the beginning, the transmitter is provided with a finite energy $E_{0}$, and the problem that we consider is to obtain an optimum scheduler that decides which time-slots to be used for transmission such that it maximizes the number of packet transmissions with a total energy $E_{0}$, and within a delay deadline of $d+1$ time-slots for each packet. We model this problem as a Markov Decision process, and provide a dynamic programming (DP) based solution which is prohibitively complex, but can be numerically solved. The computational complexity of the DP solution motivates us to provide two sub-optimal heuristic solutions to the scheduling problem. We provide the throughput and average energy performance of the heuristic solutions.
{"title":"Energy Optimal Packet Scheduling with Individual Packet Delay Constraints","authors":"Dony J. Muttath, M. Santhoshkumar, K. Premkumar","doi":"10.1109/ANTS.2018.8710104","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710104","url":null,"abstract":"We consider a problem of scheduling packets in a fading link where each packet is required to reach the destination before a delay deadline. Time is slotted, and at the beginning of each slot, a packet arrives according to an arrival process. A packet on arrival is stored in a buffer, and it is required to reach the destination before a total delay of $d+ 1$ slots (i.e., the maximum waiting time in the buffer can be d time-slots and one time-slot delay for transmission). At the beginning, the transmitter is provided with a finite energy $E_{0}$, and the problem that we consider is to obtain an optimum scheduler that decides which time-slots to be used for transmission such that it maximizes the number of packet transmissions with a total energy $E_{0}$, and within a delay deadline of $d+1$ time-slots for each packet. We model this problem as a Markov Decision process, and provide a dynamic programming (DP) based solution which is prohibitively complex, but can be numerically solved. The computational complexity of the DP solution motivates us to provide two sub-optimal heuristic solutions to the scheduling problem. We provide the throughput and average energy performance of the heuristic solutions.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710126
S. K. Datta, C. Bonnet
The Internet of Things (IoT) and connected devices are impacting enterprises, public sector bodies, and citizens in many ways. In parallel, upcoming 5G and Multi-Access Edge Computing (MEC) are aiming to enable ultra low latency use cases for IoT. This paper proposes to utilize MEC and IoT based architecture for automatic agent reconfiguration in smart manufacturing floors. The EURECOM IoT Platform is extended to achieve this purpose.
{"title":"MEC and IoT Based Automatic Agent Reconfiguration in Industry 4.0","authors":"S. K. Datta, C. Bonnet","doi":"10.1109/ANTS.2018.8710126","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710126","url":null,"abstract":"The Internet of Things (IoT) and connected devices are impacting enterprises, public sector bodies, and citizens in many ways. In parallel, upcoming 5G and Multi-Access Edge Computing (MEC) are aiming to enable ultra low latency use cases for IoT. This paper proposes to utilize MEC and IoT based architecture for automatic agent reconfiguration in smart manufacturing floors. The EURECOM IoT Platform is extended to achieve this purpose.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121888786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710044
D. Mishra, Salim Pathan, C. Murthy
Internet today is an integral part of an organization’s working. It is vital to monitor Internet traffic closely in order to detect threats and malicious activities which may not only impact the reputation of an organization but also lead to data loss. One way of achieving this goal is to monitor the logs of critical applications like proxy server which contains crucial information related to Internet activity. Log data is often huge and is ever growing. Also, forensic analysis of an event requires not only current data but also historical one. This poses a big problem of efficient and fast storage and retrieval of data. Traditional RDBMS technologies fail in such situations but with the advent of big data technologies like Apache Hadoop and Apache Spark this task has now become feasible. In this paper, we propose a Spark based system for analysis of Squid proxy logs. Using this system we generate statistics like top domains accessed, top users etc for studying traffic behavior within organization and detect malicious activity. We further study the variation in proposed system’s performance with increase in data volume and variation in spark parameters like number of executors, number of executor cores and executor memory. From our experimental study we conclude that log analysis with Spark is extremely fast with no significant performance variation observed with increase in data volume. The challenging task, however, is selecting spark parameters for getting optimal performance.
{"title":"Apache Spark Based Analytics of Squid Proxy Logs","authors":"D. Mishra, Salim Pathan, C. Murthy","doi":"10.1109/ANTS.2018.8710044","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710044","url":null,"abstract":"Internet today is an integral part of an organization’s working. It is vital to monitor Internet traffic closely in order to detect threats and malicious activities which may not only impact the reputation of an organization but also lead to data loss. One way of achieving this goal is to monitor the logs of critical applications like proxy server which contains crucial information related to Internet activity. Log data is often huge and is ever growing. Also, forensic analysis of an event requires not only current data but also historical one. This poses a big problem of efficient and fast storage and retrieval of data. Traditional RDBMS technologies fail in such situations but with the advent of big data technologies like Apache Hadoop and Apache Spark this task has now become feasible. In this paper, we propose a Spark based system for analysis of Squid proxy logs. Using this system we generate statistics like top domains accessed, top users etc for studying traffic behavior within organization and detect malicious activity. We further study the variation in proposed system’s performance with increase in data volume and variation in spark parameters like number of executors, number of executor cores and executor memory. From our experimental study we conclude that log analysis with Spark is extremely fast with no significant performance variation observed with increase in data volume. The challenging task, however, is selecting spark parameters for getting optimal performance.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124676369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710125
A. Bishnu, Suman Das, Megha Soni, V. Bhatia
Visible light communication (VLC) has emerged as a promising supplement to radio frequency technology for secure and green wireless communication. In this paper, comparative analysis of various low cost photodetectors such as solar panel and silicon photodiode (PD) is performed to check the viability of VLC for low cost easily available commodity hardware. To check the viability of VLC in different practical scenarios, experiments are performed in dark room and in the presence of noise from sunlight and artificial light sources such as fluorescent and incandescent lamps. Experimental results indicate that PD exhibits superior performance over solar panel in terms of sharp rise and fall time. However, the bit error rate performance of solar panel is better than that of PD for the given setup.
{"title":"Comparative Analysis of Low Cost Photodetectors for Visible Light Communication","authors":"A. Bishnu, Suman Das, Megha Soni, V. Bhatia","doi":"10.1109/ANTS.2018.8710125","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710125","url":null,"abstract":"Visible light communication (VLC) has emerged as a promising supplement to radio frequency technology for secure and green wireless communication. In this paper, comparative analysis of various low cost photodetectors such as solar panel and silicon photodiode (PD) is performed to check the viability of VLC for low cost easily available commodity hardware. To check the viability of VLC in different practical scenarios, experiments are performed in dark room and in the presence of noise from sunlight and artificial light sources such as fluorescent and incandescent lamps. Experimental results indicate that PD exhibits superior performance over solar panel in terms of sharp rise and fall time. However, the bit error rate performance of solar panel is better than that of PD for the given setup.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123613035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ANTS.2018.8710065
Kamal K. Garg, P. Singya, V. Bhatia
Ultraviolet (UV) communication experiences strong aerosol and molecular scattering which leads to non-line-of-sight (NLOS) connectivity. As the UV signal propagates through the atmosphere, the change in the refractive index of the atmosphere causes random fluctuations in the transmitted signal, this phenomenon is referred to as turbulence. The effect of atmospheric turbulence in NLOS UV communication link is usually ignored under the assumption of short distance communication. In this paper, we consider a NLOS UV communication system experiencing fading due to atmospheric turbulence and use relay-assisted transmission for improved connectivity. We present performance analysis of dual-hop amplify-and-forward (AF) relayed outdoor NLOS UV communication and derive closed-form expressions for the outage probability, average symbol error rate, ergodic capacity and relative diversity order. Analytical expressions using two different approximations are compared and validated with simulations.
{"title":"Performance Analysis of AF Relayed NLOS UV Communication Over Turbulent Channel","authors":"Kamal K. Garg, P. Singya, V. Bhatia","doi":"10.1109/ANTS.2018.8710065","DOIUrl":"https://doi.org/10.1109/ANTS.2018.8710065","url":null,"abstract":"Ultraviolet (UV) communication experiences strong aerosol and molecular scattering which leads to non-line-of-sight (NLOS) connectivity. As the UV signal propagates through the atmosphere, the change in the refractive index of the atmosphere causes random fluctuations in the transmitted signal, this phenomenon is referred to as turbulence. The effect of atmospheric turbulence in NLOS UV communication link is usually ignored under the assumption of short distance communication. In this paper, we consider a NLOS UV communication system experiencing fading due to atmospheric turbulence and use relay-assisted transmission for improved connectivity. We present performance analysis of dual-hop amplify-and-forward (AF) relayed outdoor NLOS UV communication and derive closed-form expressions for the outage probability, average symbol error rate, ergodic capacity and relative diversity order. Analytical expressions using two different approximations are compared and validated with simulations.","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ants.2018.8710166
{"title":"ANTS 2018 Copyright Page","authors":"","doi":"10.1109/ants.2018.8710166","DOIUrl":"https://doi.org/10.1109/ants.2018.8710166","url":null,"abstract":"","PeriodicalId":273443,"journal":{"name":"2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128063942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}