Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987653
S. Mrdović, Darijo Raca, K. Turbic
Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protocols for session control, SIP. and media transfer, RTP, have their secured versions, SIPS and RTSP. That solution would require multiple protocols and keys and would be a burden on users and system administrators. This paper proposes an architecture that uses IMS to provide services and VPN to secure them. IMS provides convenience of user mobility. VPN provides authentication, confidentiality and integrity. Additional security provided by VPN does not translate to additional work for users, It is completely transparent for them. Proposed design is implemented and tested. IMS with different services was available, through VPN, to mobile users connected to the Internet with different devices and connections. The testing confirmed security and usability for mobile users.
{"title":"Security analysis of user mobility in triple-play systems","authors":"S. Mrdović, Darijo Raca, K. Turbic","doi":"10.1109/BIHTEL.2014.6987653","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987653","url":null,"abstract":"Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protocols for session control, SIP. and media transfer, RTP, have their secured versions, SIPS and RTSP. That solution would require multiple protocols and keys and would be a burden on users and system administrators. This paper proposes an architecture that uses IMS to provide services and VPN to secure them. IMS provides convenience of user mobility. VPN provides authentication, confidentiality and integrity. Additional security provided by VPN does not translate to additional work for users, It is completely transparent for them. Proposed design is implemented and tested. IMS with different services was available, through VPN, to mobile users connected to the Internet with different devices and connections. The testing confirmed security and usability for mobile users.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987651
D. Tralic, S. Grgic, B. Zovko-Cihlar
Copy-move forgery (CMF) is a common image forgery method that implies copying and moving a part of image to a new location in the same image. In video sequences, CMF can be accomplished by copying a set of frames and pasting them to a new location in the same sequence. The result of this process is usually changing of video content. To identify video CMF, it is necessary to develop a robust descriptor for identification of duplicated video frames. This paper presents a novel method where Cellular Automata (CA) and Local Binary Patterns (LBPs) are used as texture descriptors. The main idea is to divide every frame into overlapping blocks and use CA to learn a set of rules for every block in a frame. Those rules appropriately describe the intensity changes in every block so their histogram can be used as a feature for detection of duplicated frames. Experimental testing showed a good performance of a proposed method for detection of video CMF in all tested cases.
{"title":"Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns","authors":"D. Tralic, S. Grgic, B. Zovko-Cihlar","doi":"10.1109/BIHTEL.2014.6987651","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987651","url":null,"abstract":"Copy-move forgery (CMF) is a common image forgery method that implies copying and moving a part of image to a new location in the same image. In video sequences, CMF can be accomplished by copying a set of frames and pasting them to a new location in the same sequence. The result of this process is usually changing of video content. To identify video CMF, it is necessary to develop a robust descriptor for identification of duplicated video frames. This paper presents a novel method where Cellular Automata (CA) and Local Binary Patterns (LBPs) are used as texture descriptors. The main idea is to divide every frame into overlapping blocks and use CA to learn a set of rules for every block in a frame. Those rules appropriately describe the intensity changes in every block so their histogram can be used as a feature for detection of duplicated frames. Experimental testing showed a good performance of a proposed method for detection of video CMF in all tested cases.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987652
Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic
This paper discusses a concept of predicting interactions between measurable (technical) parameters of telecommunications network - QoS (Quality of Service) and QoE (Quality of Experience) of the video under realistic triple play network conditions using IPTV (Internet Protocol TV). Here is represented a simulation method using OPNET as simulation tool that includes a complete scenario of IPTV channels distribution in the hypothetical IP / MPLS network. Based on simulation results of the QoS parameters in the network and using of certain well-known regression analysis of QoS/QoE correlation model it is possible to evaluate the quality of the received video perceived by the user. It performs the mapping between quality assessment VQR (Video Quality Ratings), VQM (Video Quality Metric) and DMOS (Difference Mean Opinion Score) subjective rating scales. In that way it performs validation of IPTV service in terms of comparing the original video and the received video by the end user. The aim of this paper is to demonstrate the possibility of video quality validation under laboratory conditions using simulation method.
{"title":"Validating IPTV service quality under realistic triple play network conditions","authors":"Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic","doi":"10.1109/BIHTEL.2014.6987652","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987652","url":null,"abstract":"This paper discusses a concept of predicting interactions between measurable (technical) parameters of telecommunications network - QoS (Quality of Service) and QoE (Quality of Experience) of the video under realistic triple play network conditions using IPTV (Internet Protocol TV). Here is represented a simulation method using OPNET as simulation tool that includes a complete scenario of IPTV channels distribution in the hypothetical IP / MPLS network. Based on simulation results of the QoS parameters in the network and using of certain well-known regression analysis of QoS/QoE correlation model it is possible to evaluate the quality of the received video perceived by the user. It performs the mapping between quality assessment VQR (Video Quality Ratings), VQM (Video Quality Metric) and DMOS (Difference Mean Opinion Score) subjective rating scales. In that way it performs validation of IPTV service in terms of comparing the original video and the received video by the end user. The aim of this paper is to demonstrate the possibility of video quality validation under laboratory conditions using simulation method.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987637
D. Boskovic, Z. Avdagić
This paper presents a XML-based specification of the fuzzy system (FS) with objective to facilitate FS development by separation of the Fuzzy Inference System (FIS) implementation and a problem domain description. Generic FIS application is implemented in Java, and XML schema for domain knowledge specification is developed. Study case supporting the experimental evaluation of the proposed solution is software quality evaluation.
{"title":"XML-based fuzzy system specification","authors":"D. Boskovic, Z. Avdagić","doi":"10.1109/BIHTEL.2014.6987637","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987637","url":null,"abstract":"This paper presents a XML-based specification of the fuzzy system (FS) with objective to facilitate FS development by separation of the Fuzzy Inference System (FIS) implementation and a problem domain description. Generic FIS application is implemented in Java, and XML schema for domain knowledge specification is developed. Study case supporting the experimental evaluation of the proposed solution is software quality evaluation.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987645
V. Miletić, Tomislav Šubić, B. Mikac
Network availability is an essential feature of an optical telecommunication network. Should a failure of a network component occur, be it a link or a component inside a node, network control plane must be able to detect the failure and reroute the traffic using spare components until a repair is done. Shared risk link groups (SRLGs) are used to describe a situation where seemingly unrelated logical failures happen due to a single physical failure. For example, two or more links might share a bridge crossing; should a failure happen, all of them will be damaged. Routing algorithms were proposed to ensure working and spare paths of a connection in a network are SRLG-disjoint to avoid such common cause failures. However, complete SRLG-disjointness of working and spare path is not always possible due to limited number of links or limited capacity available in the network, so maximum SRLG-disjoint paths algorithm is taken instead. Maximum SRLG-disjoint path problem is in general NP-hard. In terms of solution quality greedy algorithms for maximum SRLG-disjoint path problem are as good as more complicated heuristics. To improve the performance of maximum SRLG-disjoint path greedy algorithm, it was implemented using NVIDIA CUDA heterogeneous parallel programming platform and executed on graphics processing unit. The implementation of maximum SRLG-disjoint path algorithm on GPU increases performance significantly compared to implementation utilizing only CPU, especially in simulations of large networks.
{"title":"Optimizing maximum shared risk link group disjoint path algorithm using NVIDIA CUDA heterogeneous parallel programming platform","authors":"V. Miletić, Tomislav Šubić, B. Mikac","doi":"10.1109/BIHTEL.2014.6987645","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987645","url":null,"abstract":"Network availability is an essential feature of an optical telecommunication network. Should a failure of a network component occur, be it a link or a component inside a node, network control plane must be able to detect the failure and reroute the traffic using spare components until a repair is done. Shared risk link groups (SRLGs) are used to describe a situation where seemingly unrelated logical failures happen due to a single physical failure. For example, two or more links might share a bridge crossing; should a failure happen, all of them will be damaged. Routing algorithms were proposed to ensure working and spare paths of a connection in a network are SRLG-disjoint to avoid such common cause failures. However, complete SRLG-disjointness of working and spare path is not always possible due to limited number of links or limited capacity available in the network, so maximum SRLG-disjoint paths algorithm is taken instead. Maximum SRLG-disjoint path problem is in general NP-hard. In terms of solution quality greedy algorithms for maximum SRLG-disjoint path problem are as good as more complicated heuristics. To improve the performance of maximum SRLG-disjoint path greedy algorithm, it was implemented using NVIDIA CUDA heterogeneous parallel programming platform and executed on graphics processing unit. The implementation of maximum SRLG-disjoint path algorithm on GPU increases performance significantly compared to implementation utilizing only CPU, especially in simulations of large networks.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987636
B. Trstenjak, D. Donko
Internet and various services offered by it has become a daily routine. The Quality of Web Service (QWS) has become a significant factor in distinguishing the success of service providers. The main purpose of this paper is to analyze quality prediction using the IKS hybrid model with a new approach of data classification. We present the IKS hybrid model. The model combines selection of features, clustering and classification techniques. Three techniques are used (Information Gain (IG), K-means and Support Vector Machine (SVM)) over QWS dataset with collected 5,000 Web services. Our experiments and test results show that the proposed hybrid approach has achieved promising results in predicting the quality of web services and it represents a good basis for further development and research.
{"title":"Predicting Quality of Web Service using IKS hybrid model","authors":"B. Trstenjak, D. Donko","doi":"10.1109/BIHTEL.2014.6987636","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987636","url":null,"abstract":"Internet and various services offered by it has become a daily routine. The Quality of Web Service (QWS) has become a significant factor in distinguishing the success of service providers. The main purpose of this paper is to analyze quality prediction using the IKS hybrid model with a new approach of data classification. We present the IKS hybrid model. The model combines selection of features, clustering and classification techniques. Three techniques are used (Information Gain (IG), K-means and Support Vector Machine (SVM)) over QWS dataset with collected 5,000 Web services. Our experiments and test results show that the proposed hybrid approach has achieved promising results in predicting the quality of web services and it represents a good basis for further development and research.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":" 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987641
D. Dobrilović, Ž. Stojanov, B. Odadzic
Concepts related to Wireless Sensor Networks (WSN), Machine-to-Machine (M2M) and the Internet of Things (IoT) have recently gained significant attention in university education. According to this, the need for low-cost, modular, easy-to-use and scalable platform used for building various network systems in order to provide an environment for developing and testing software applications for WSN, IoT and related technologies is very high. This paper presents an approach in creating platform based on open source hardware designed to provide an infrastructure for teaching development of software applications for WSN, in this case applications for RFID/ZigBee networks, to be used in Computing education and profession.
{"title":"Teaching application development for RFID/ZigBee networks using open source hardware","authors":"D. Dobrilović, Ž. Stojanov, B. Odadzic","doi":"10.1109/BIHTEL.2014.6987641","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987641","url":null,"abstract":"Concepts related to Wireless Sensor Networks (WSN), Machine-to-Machine (M2M) and the Internet of Things (IoT) have recently gained significant attention in university education. According to this, the need for low-cost, modular, easy-to-use and scalable platform used for building various network systems in order to provide an environment for developing and testing software applications for WSN, IoT and related technologies is very high. This paper presents an approach in creating platform based on open source hardware designed to provide an infrastructure for teaching development of software applications for WSN, in this case applications for RFID/ZigBee networks, to be used in Computing education and profession.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987649
Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic
This paper gives one possible application of Ćuk converter for telecommunication equipment power supply. Ćuk converter is controlled with cascade control system, with two regualtion loops, outer loop is voltage PI control loop and inner loop is current SMC (Sliding Mode Control) controlled loop. The control system also has input inductor current limiter, which is necessary in cases of large input currents. Simulation results show good control in cases of input voltage test signals with high frequency ripple and slow changes.
{"title":"Cascade SMC control of Ćuk converter for telecommunication systems power supply","authors":"Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic","doi":"10.1109/BIHTEL.2014.6987649","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987649","url":null,"abstract":"This paper gives one possible application of Ćuk converter for telecommunication equipment power supply. Ćuk converter is controlled with cascade control system, with two regualtion loops, outer loop is voltage PI control loop and inner loop is current SMC (Sliding Mode Control) controlled loop. The control system also has input inductor current limiter, which is necessary in cases of large input currents. Simulation results show good control in cases of input voltage test signals with high frequency ripple and slow changes.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987646
Jelena Misic, V. Markovic, Z. Marinković
In wireless communication systems the amplifier non-linear distortion problems are extremely challenging. The linearization techniques based on behavioral models of amplifiers, seem to be very promising, therefore developing a suitable non-linear model is of the crucial importance. A rigorous approach for non-linear modeling is using the of Volterra series, however the calculation of the Volterra coefficients is a complex and time-consuming task. In this paper, an easy and advanced approach for extraction of the Volterra kernels will be presented. The third order Volterra kernels are derived from the parameters of a feed-forward time delay neural network with a suitable activation function.
{"title":"Volterra kernels extraction from neural networks for amplifier behavioral modeling","authors":"Jelena Misic, V. Markovic, Z. Marinković","doi":"10.1109/BIHTEL.2014.6987646","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987646","url":null,"abstract":"In wireless communication systems the amplifier non-linear distortion problems are extremely challenging. The linearization techniques based on behavioral models of amplifiers, seem to be very promising, therefore developing a suitable non-linear model is of the crucial importance. A rigorous approach for non-linear modeling is using the of Volterra series, however the calculation of the Volterra coefficients is a complex and time-consuming task. In this paper, an easy and advanced approach for extraction of the Volterra kernels will be presented. The third order Volterra kernels are derived from the parameters of a feed-forward time delay neural network with a suitable activation function.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-12-18DOI: 10.1109/BIHTEL.2014.6987643
A. Semenova, A. Tikhomirov
In the paper a new method based on feedforward carrier estimation circuit is described for BPSK carrier synchronization. Simulation of model based on proposed method shows comparable performance with square-law and Costas loop feedback circuits in small frequency shift conditions in AWGN channel, but operates in a frequency range up to 10% of symbol rate with slowly degrading BER comparing to maximum tracking range of 3% of symbol rate for feedback circuits. Due to its wide frequency band and implementation simplicity, proposed circuit is recommended for using in the communication BPSK systems with large Doppler shift.
{"title":"Feedforward carrier estimation method for bpsk with large Doppler shift","authors":"A. Semenova, A. Tikhomirov","doi":"10.1109/BIHTEL.2014.6987643","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987643","url":null,"abstract":"In the paper a new method based on feedforward carrier estimation circuit is described for BPSK carrier synchronization. Simulation of model based on proposed method shows comparable performance with square-law and Costas loop feedback circuits in small frequency shift conditions in AWGN channel, but operates in a frequency range up to 10% of symbol rate with slowly degrading BER comparing to maximum tracking range of 3% of symbol rate for feedback circuits. Due to its wide frequency band and implementation simplicity, proposed circuit is recommended for using in the communication BPSK systems with large Doppler shift.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}