Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987640
Kemal Lutvica, S. Konjicija
This paper deals with the design and implementation of a discrete dynamic control system using multi-objective dynamic programming. A discrete dynamic system along with the constraints regarding the values of the system's state (output) and the applicable control input has been introduced. Using multi-objective dynamic programming, a control system has been designed which minimizes two objectives while satisfying introduced constraints. The implemented control solution is explained. Experiments have been performed to test the quality of the implemented solution. A single-objective version of the control problem has been tested to provide reference for analysis regarding the quality of the implemented multi-objective control solution. The comparison of the obtained experimental results confirms the effectiveness of the proposed control solution and demonstrates the benefits of the multi-objective approach.
{"title":"Discrete dynamic system control using multi-objective dynamic programming","authors":"Kemal Lutvica, S. Konjicija","doi":"10.1109/BIHTEL.2014.6987640","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987640","url":null,"abstract":"This paper deals with the design and implementation of a discrete dynamic control system using multi-objective dynamic programming. A discrete dynamic system along with the constraints regarding the values of the system's state (output) and the applicable control input has been introduced. Using multi-objective dynamic programming, a control system has been designed which minimizes two objectives while satisfying introduced constraints. The implemented control solution is explained. Experiments have been performed to test the quality of the implemented solution. A single-objective version of the control problem has been tested to provide reference for analysis regarding the quality of the implemented multi-objective control solution. The comparison of the obtained experimental results confirms the effectiveness of the proposed control solution and demonstrates the benefits of the multi-objective approach.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123254952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987632
Globa Larysa, S. Mariia, Pidgurska Tetiana, A. Reverchuk
Qualitative online billing system performance is essential for cost-effective service providers. This paper presents the method of technical resources' distribution of the billing server based on the resource requirements of different types of service that takes into account the daily load statistics of different types of services and increases the revenue by providing an individual approach to services with different costs. The method of incoming billing requests' flow management is proposed according to the requirements for technical resources. The developed method can reduce the loss of tariff requirements caused by the exceedence of maintenance time. The results of incoming billing requests' flow management simulation have been obtained that prove the effectiveness of the proposed method.
{"title":"Managing of incoming stream applications in online charging system","authors":"Globa Larysa, S. Mariia, Pidgurska Tetiana, A. Reverchuk","doi":"10.1109/BIHTEL.2014.6987632","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987632","url":null,"abstract":"Qualitative online billing system performance is essential for cost-effective service providers. This paper presents the method of technical resources' distribution of the billing server based on the resource requirements of different types of service that takes into account the daily load statistics of different types of services and increases the revenue by providing an individual approach to services with different costs. The method of incoming billing requests' flow management is proposed according to the requirements for technical resources. The developed method can reduce the loss of tariff requirements caused by the exceedence of maintenance time. The results of incoming billing requests' flow management simulation have been obtained that prove the effectiveness of the proposed method.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987655
M. Hadzialic, Jasmin Musovic, M. Hamza, M. Milisic, Jasenka Dizdarevic, M. Dulic, M. Skrbic
The rapid growth of connected devices worldwide has dramatically increased demand for available spectrum. The changeover to spectrum efficient digital terrestrial TV transmission freed up large blocks of spectrum. This paper aims to offer the results of the analysis of 3G mobile network usage in terms of traffic based on the case of dominant mobile operator in Bosnia and Herzegovina (B&H). By this it is identified whether the demand for more radio spectrum is legitimate. In order to satisfy the requirement for extension of radio spectrum aimed for broadband services the broadcast spectrum (470 - 700 MHz) has been investigated. The rest of the UHF broadcast band (700 - 860 MHz) was not considered since it is specified as the Digital Dividend and hence was not a subject of dynamic access to the spectrum investigation. All results have been compared to the relevant researches conducted in some European, US, Asian and African countries. Ultimately the analysis results would help the modernization and enhancement of spectrum management proposing the concept of spectrum sharing and dynamic spectrum access to the national regulatory authority in B&H.
{"title":"Modern spectrum management: Survey of 3G network traffic in Bosnia and Herzegovina","authors":"M. Hadzialic, Jasmin Musovic, M. Hamza, M. Milisic, Jasenka Dizdarevic, M. Dulic, M. Skrbic","doi":"10.1109/BIHTEL.2014.6987655","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987655","url":null,"abstract":"The rapid growth of connected devices worldwide has dramatically increased demand for available spectrum. The changeover to spectrum efficient digital terrestrial TV transmission freed up large blocks of spectrum. This paper aims to offer the results of the analysis of 3G mobile network usage in terms of traffic based on the case of dominant mobile operator in Bosnia and Herzegovina (B&H). By this it is identified whether the demand for more radio spectrum is legitimate. In order to satisfy the requirement for extension of radio spectrum aimed for broadband services the broadcast spectrum (470 - 700 MHz) has been investigated. The rest of the UHF broadcast band (700 - 860 MHz) was not considered since it is specified as the Digital Dividend and hence was not a subject of dynamic access to the spectrum investigation. All results have been compared to the relevant researches conducted in some European, US, Asian and African countries. Ultimately the analysis results would help the modernization and enhancement of spectrum management proposing the concept of spectrum sharing and dynamic spectrum access to the national regulatory authority in B&H.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116846781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987634
Pidgurska Tetiana, O. Trubin
A novel approach of dual-band filters' design has been proposed operating in both basic TE10b and higher TE20b modes of rectangular dielectric resonator. The researched dual-band filter consists of two equal elongated dielectric resonators with approximately equal coupling coefficients in both modes. In order to prove the concept, the coupling coefficients dependencies on the parameters of filter structure have been studied by utilizing the numerical method as well as the analytical solution of dual-band filter has been built showing good agreement with the simulation results by finite elements' method. The proposed dual-band filter can be used for multi-band applications in wireless networks.
{"title":"Novel dual-band rectangular dielectric resonator filter","authors":"Pidgurska Tetiana, O. Trubin","doi":"10.1109/BIHTEL.2014.6987634","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987634","url":null,"abstract":"A novel approach of dual-band filters' design has been proposed operating in both basic TE10b and higher TE20b modes of rectangular dielectric resonator. The researched dual-band filter consists of two equal elongated dielectric resonators with approximately equal coupling coefficients in both modes. In order to prove the concept, the coupling coefficients dependencies on the parameters of filter structure have been studied by utilizing the numerical method as well as the analytical solution of dual-band filter has been built showing good agreement with the simulation results by finite elements' method. The proposed dual-band filter can be used for multi-band applications in wireless networks.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122966396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987639
Bakir Karahodža, H. Supic, D. Donko
Traditional recommender systems use collaborative filtering or content-based methods to recommend new items for users. New users and items are continuously updated to the system bringing changes in user's preferences, as well as the additional context in form of temporal information. The continuous system updates change not just individual user's preferences, but also group user's preferences affecting prediction of ratings for individual users. In this work is presented improved user-based collaborative filtering algorithm using temporal contextual information. With difference to other approaches, we propose using weight function based on changes in the group user's preferences over time that increases prediction accuracy of collaborative filtering prediction algorithm.
{"title":"An approach to design of time-aware recommender system based on changes in group user's preferences","authors":"Bakir Karahodža, H. Supic, D. Donko","doi":"10.1109/BIHTEL.2014.6987639","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987639","url":null,"abstract":"Traditional recommender systems use collaborative filtering or content-based methods to recommend new items for users. New users and items are continuously updated to the system bringing changes in user's preferences, as well as the additional context in form of temporal information. The continuous system updates change not just individual user's preferences, but also group user's preferences affecting prediction of ratings for individual users. In this work is presented improved user-based collaborative filtering algorithm using temporal contextual information. With difference to other approaches, we propose using weight function based on changes in the group user's preferences over time that increases prediction accuracy of collaborative filtering prediction algorithm.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115192854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987631
Omar Bilalovic, D. Donko
This paper presents the results of the analysis of the network intrusion detection systems using data mining techniques and anomaly detection. Anomaly detection technique is present for a while in the area of data mining. Previous papers that implement data mining techniques to detect anomaly attacks actually use well-known techniques such as classification or clustering. Anomaly detection technique combines all these techniques. They are also facing problem on the fact that many of the attacks do not have some kind of signature on network and transport layer, so it is not easy to train models for these type of attacks. Network dataset that was used in this paper is DARPA 1998 dataset created in MIT Lincoln Laboratory and is used worldwide for the network testing purposes.
{"title":"Usage of data mining techniques for analyzing network intrusions","authors":"Omar Bilalovic, D. Donko","doi":"10.1109/BIHTEL.2014.6987631","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987631","url":null,"abstract":"This paper presents the results of the analysis of the network intrusion detection systems using data mining techniques and anomaly detection. Anomaly detection technique is present for a while in the area of data mining. Previous papers that implement data mining techniques to detect anomaly attacks actually use well-known techniques such as classification or clustering. Anomaly detection technique combines all these techniques. They are also facing problem on the fact that many of the attacks do not have some kind of signature on network and transport layer, so it is not easy to train models for these type of attacks. Network dataset that was used in this paper is DARPA 1998 dataset created in MIT Lincoln Laboratory and is used worldwide for the network testing purposes.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117056325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987629
Č. Livada, I. Galić, B. Zovko-Cihlar
This research analyzes the susceptibility to errors in the communication channel of the two standards in image compression - JPEG and JPEG 2000. Errors are introduced to the bit stream via channel noise, i.e. Gauss, Poisson, uniform noise and their influence to image quality is measured by objective and subjective image quality assessment methods. A novel compression method based on partial differential equations is introduced as a direct contender to two before mentioned standards.
{"title":"Visual repercussions of the noise induced errors in the communication channel on compressed images","authors":"Č. Livada, I. Galić, B. Zovko-Cihlar","doi":"10.1109/BIHTEL.2014.6987629","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987629","url":null,"abstract":"This research analyzes the susceptibility to errors in the communication channel of the two standards in image compression - JPEG and JPEG 2000. Errors are introduced to the bit stream via channel noise, i.e. Gauss, Poisson, uniform noise and their influence to image quality is measured by objective and subjective image quality assessment methods. A novel compression method based on partial differential equations is introduced as a direct contender to two before mentioned standards.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132007424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987657
Martina Vistica, Hana Haseljic, A. Maksumic, N. Nosovic
Paper presents speedup achieved through parallelization of code for computing π. Codes are implemented in C# with .NET framework and in C with OpenMP, on machine with i7 processor. Parallelization of code, more precisely embarassingly parallel problem, should show linear speedup, but as as shown in the following paper the same was not proven to be right. The differences in speedup between OpenMP and Task Parallel Library, hereinafter referenced as TPL are demonstrated by calculating speedup in different scenarios. Problem remains the same through the scenarios, but the number of iterations and the number of cores activated are changed. Finally, results are presented comparing the time needed for execution of serial and parallel computing. Ultimately, the results show that OpenMP is parallelization tool that is adviced to use while solving problems similar to the problem that is considered in this paper.
{"title":"Comparison of speedups for computing π using .NET TPL and OpenMP parallelization techonologies","authors":"Martina Vistica, Hana Haseljic, A. Maksumic, N. Nosovic","doi":"10.1109/BIHTEL.2014.6987657","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987657","url":null,"abstract":"Paper presents speedup achieved through parallelization of code for computing π. Codes are implemented in C# with .NET framework and in C with OpenMP, on machine with i7 processor. Parallelization of code, more precisely embarassingly parallel problem, should show linear speedup, but as as shown in the following paper the same was not proven to be right. The differences in speedup between OpenMP and Task Parallel Library, hereinafter referenced as TPL are demonstrated by calculating speedup in different scenarios. Problem remains the same through the scenarios, but the number of iterations and the number of cores activated are changed. Finally, results are presented comparing the time needed for execution of serial and parallel computing. Ultimately, the results show that OpenMP is parallelization tool that is adviced to use while solving problems similar to the problem that is considered in this paper.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131701823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987644
L. Timchenko, N. I. Kokriatskaia, M. Petrovski, A. Denysova
In this paper, we examine the methods of laser beam images classification and their uses. We discuss the necessity of noise filters using adaptive methods in beam reflection, such as parallel-hierarchical networks. A demonstration of this network is shown on a PLD (programmable logic device).
{"title":"Laser beam images classification methods with the use of parallel-hierarchical network running on PLD","authors":"L. Timchenko, N. I. Kokriatskaia, M. Petrovski, A. Denysova","doi":"10.1109/BIHTEL.2014.6987644","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987644","url":null,"abstract":"In this paper, we examine the methods of laser beam images classification and their uses. We discuss the necessity of noise filters using adaptive methods in beam reflection, such as parallel-hierarchical networks. A demonstration of this network is shown on a PLD (programmable logic device).","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127955046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987642
Emil Gracic, A. Hayek, J. Borcsok
This paper describes the implementation and integration process of a complete communication computer system on the field programmable gate array (FPGA). After such a design is reached, safety measures are integrated to achieve a safety-related architecture. For this purpose a diagnostic unit will be implemented, consisting of hardware and software tests. Hardware tests are related to the control of the FPGA functionality. They are based on the integration of two existing methods to reach complete hardware test coverage. The software tests are used for a continuous testing of the whole system (this means testing the central processing unit, bus systems, peripherals and memory). Furthermore, a safety multiplexer is integrated with the task to turn off the current operating system (main system) and to turn on a redundant system when a failure is introduced via the diagnostic unit. The safety multiplexer has to give the permission to the redundant system to receive the outputs from the main system in a way that is free from faults. The microcontroller ColdFire is used as a basis, which provides numerous features for the control of various peripherals as well as the connection of various types of memory.
{"title":"Approach to the development of an FPGA-based safety-related, complete communication computer system","authors":"Emil Gracic, A. Hayek, J. Borcsok","doi":"10.1109/BIHTEL.2014.6987642","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987642","url":null,"abstract":"This paper describes the implementation and integration process of a complete communication computer system on the field programmable gate array (FPGA). After such a design is reached, safety measures are integrated to achieve a safety-related architecture. For this purpose a diagnostic unit will be implemented, consisting of hardware and software tests. Hardware tests are related to the control of the FPGA functionality. They are based on the integration of two existing methods to reach complete hardware test coverage. The software tests are used for a continuous testing of the whole system (this means testing the central processing unit, bus systems, peripherals and memory). Furthermore, a safety multiplexer is integrated with the task to turn off the current operating system (main system) and to turn on a redundant system when a failure is introduced via the diagnostic unit. The safety multiplexer has to give the permission to the redundant system to receive the outputs from the main system in a way that is free from faults. The microcontroller ColdFire is used as a basis, which provides numerous features for the control of various peripherals as well as the connection of various types of memory.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}