首页 > 最新文献

2014 X International Symposium on Telecommunications (BIHTEL)最新文献

英文 中文
Security analysis of user mobility in triple-play systems 三播系统中用户移动性的安全性分析
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987653
S. Mrdović, Darijo Raca, K. Turbic
Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protocols for session control, SIP. and media transfer, RTP, have their secured versions, SIPS and RTSP. That solution would require multiple protocols and keys and would be a burden on users and system administrators. This paper proposes an architecture that uses IMS to provide services and VPN to secure them. IMS provides convenience of user mobility. VPN provides authentication, confidentiality and integrity. Additional security provided by VPN does not translate to additional work for users, It is completely transparent for them. Proposed design is implemented and tested. IMS with different services was available, through VPN, to mobile users connected to the Internet with different devices and connections. The testing confirmed security and usability for mobile users.
三重游戏系统的用户希望能够在不同的地点使用他们的服务。这就带来了将安全性扩展到手机三重游戏用户的问题。移动用户需要对系统进行身份验证,反之亦然。用户希望他们的通信保密。内容提供商要求尊重版权。会话控制协议,SIP。和媒体传输,RTP,有它们的安全版本,SIPS和RTSP。该解决方案需要多个协议和密钥,并且会给用户和系统管理员带来负担。本文提出了一种利用IMS提供业务,利用VPN保护业务的体系结构。IMS提供了用户移动性的便利性。VPN提供身份验证、机密性和完整性。VPN提供的额外安全性不会为用户带来额外的工作,它对用户来说是完全透明的。提出的设计被实施和测试。具有不同业务的IMS可以通过VPN提供给使用不同设备和连接连接到Internet的移动用户。测试证实了手机用户的安全性和可用性。
{"title":"Security analysis of user mobility in triple-play systems","authors":"S. Mrdović, Darijo Raca, K. Turbic","doi":"10.1109/BIHTEL.2014.6987653","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987653","url":null,"abstract":"Users of triple-play systems expect to be able to use their services on different locations. That opens an issue of extending security to include mobile triple-play users. Mobile users need to authenticate to the system and vice-versa. Users expect confidentiality of their communications. Content providers request copyrights to be respected. Protocols for session control, SIP. and media transfer, RTP, have their secured versions, SIPS and RTSP. That solution would require multiple protocols and keys and would be a burden on users and system administrators. This paper proposes an architecture that uses IMS to provide services and VPN to secure them. IMS provides convenience of user mobility. VPN provides authentication, confidentiality and integrity. Additional security provided by VPN does not translate to additional work for users, It is completely transparent for them. Proposed design is implemented and tested. IMS with different services was available, through VPN, to mobile users connected to the Internet with different devices and connections. The testing confirmed security and usability for mobile users.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns 基于元胞自动机和局部二值模式的视频帧复制-移动伪造检测
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987651
D. Tralic, S. Grgic, B. Zovko-Cihlar
Copy-move forgery (CMF) is a common image forgery method that implies copying and moving a part of image to a new location in the same image. In video sequences, CMF can be accomplished by copying a set of frames and pasting them to a new location in the same sequence. The result of this process is usually changing of video content. To identify video CMF, it is necessary to develop a robust descriptor for identification of duplicated video frames. This paper presents a novel method where Cellular Automata (CA) and Local Binary Patterns (LBPs) are used as texture descriptors. The main idea is to divide every frame into overlapping blocks and use CA to learn a set of rules for every block in a frame. Those rules appropriately describe the intensity changes in every block so their histogram can be used as a feature for detection of duplicated frames. Experimental testing showed a good performance of a proposed method for detection of video CMF in all tested cases.
复制-移动伪造(CMF)是一种常见的图像伪造方法,它意味着复制图像的一部分并将其移动到同一图像中的新位置。在视频序列中,CMF可以通过复制一组帧并将它们粘贴到同一序列中的新位置来完成。这个过程的结果通常是视频内容的变化。为了识别视频CMF,有必要开发一个鲁棒的描述符来识别重复的视频帧。本文提出了一种利用元胞自动机(CA)和局部二值模式(lbp)作为纹理描述符的方法。其主要思想是将每一帧划分为重叠的块,并使用CA来学习一组规则。这些规则适当地描述了每个块的强度变化,因此它们的直方图可以用作检测重复帧的特征。实验结果表明,该方法对视频CMF的检测效果良好。
{"title":"Video frame copy-move forgery detection based on Cellular Automata and Local Binary Patterns","authors":"D. Tralic, S. Grgic, B. Zovko-Cihlar","doi":"10.1109/BIHTEL.2014.6987651","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987651","url":null,"abstract":"Copy-move forgery (CMF) is a common image forgery method that implies copying and moving a part of image to a new location in the same image. In video sequences, CMF can be accomplished by copying a set of frames and pasting them to a new location in the same sequence. The result of this process is usually changing of video content. To identify video CMF, it is necessary to develop a robust descriptor for identification of duplicated video frames. This paper presents a novel method where Cellular Automata (CA) and Local Binary Patterns (LBPs) are used as texture descriptors. The main idea is to divide every frame into overlapping blocks and use CA to learn a set of rules for every block in a frame. Those rules appropriately describe the intensity changes in every block so their histogram can be used as a feature for detection of duplicated frames. Experimental testing showed a good performance of a proposed method for detection of video CMF in all tested cases.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Validating IPTV service quality under realistic triple play network conditions 验证实际三网融合网络条件下的IPTV服务质量
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987652
Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic
This paper discusses a concept of predicting interactions between measurable (technical) parameters of telecommunications network - QoS (Quality of Service) and QoE (Quality of Experience) of the video under realistic triple play network conditions using IPTV (Internet Protocol TV). Here is represented a simulation method using OPNET as simulation tool that includes a complete scenario of IPTV channels distribution in the hypothetical IP / MPLS network. Based on simulation results of the QoS parameters in the network and using of certain well-known regression analysis of QoS/QoE correlation model it is possible to evaluate the quality of the received video perceived by the user. It performs the mapping between quality assessment VQR (Video Quality Ratings), VQM (Video Quality Metric) and DMOS (Difference Mean Opinion Score) subjective rating scales. In that way it performs validation of IPTV service in terms of comparing the original video and the received video by the end user. The aim of this paper is to demonstrate the possibility of video quality validation under laboratory conditions using simulation method.
本文讨论了利用IPTV (Internet Protocol TV)预测电信网络可测量(技术)参数——QoS(服务质量)和QoE(体验质量)在实际三网融合网络条件下相互作用的概念。本文介绍了一种利用OPNET作为仿真工具的仿真方法,该方法包含了假设的IP / MPLS网络中IPTV信道分布的完整场景。基于网络中QoS参数的仿真结果,并利用某些著名的QoS/QoE相关模型的回归分析,可以对用户接收到的视频质量进行评价。它执行质量评估VQR(视频质量评级),VQM(视频质量度量)和DMOS(差分平均意见评分)主观评级量表之间的映射。通过对比原始视频和终端用户接收到的视频,对IPTV服务进行验证。本文的目的是证明在实验室条件下使用仿真方法验证视频质量的可能性。
{"title":"Validating IPTV service quality under realistic triple play network conditions","authors":"Mirsad Nuhbegovic, Alem Čolaković, A. Haskovic","doi":"10.1109/BIHTEL.2014.6987652","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987652","url":null,"abstract":"This paper discusses a concept of predicting interactions between measurable (technical) parameters of telecommunications network - QoS (Quality of Service) and QoE (Quality of Experience) of the video under realistic triple play network conditions using IPTV (Internet Protocol TV). Here is represented a simulation method using OPNET as simulation tool that includes a complete scenario of IPTV channels distribution in the hypothetical IP / MPLS network. Based on simulation results of the QoS parameters in the network and using of certain well-known regression analysis of QoS/QoE correlation model it is possible to evaluate the quality of the received video perceived by the user. It performs the mapping between quality assessment VQR (Video Quality Ratings), VQM (Video Quality Metric) and DMOS (Difference Mean Opinion Score) subjective rating scales. In that way it performs validation of IPTV service in terms of comparing the original video and the received video by the end user. The aim of this paper is to demonstrate the possibility of video quality validation under laboratory conditions using simulation method.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
XML-based fuzzy system specification 基于xml的模糊系统规范
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987637
D. Boskovic, Z. Avdagić
This paper presents a XML-based specification of the fuzzy system (FS) with objective to facilitate FS development by separation of the Fuzzy Inference System (FIS) implementation and a problem domain description. Generic FIS application is implemented in Java, and XML schema for domain knowledge specification is developed. Study case supporting the experimental evaluation of the proposed solution is software quality evaluation.
本文提出了一种基于xml的模糊系统(FS)规范,目的是通过将模糊推理系统(FIS)的实现与问题域描述分离来促进模糊系统的开发。采用Java语言实现了通用的FIS应用程序,并开发了用于领域知识规范的XML模式。支持所提出的解决方案的实验评估的研究案例是软件质量评估。
{"title":"XML-based fuzzy system specification","authors":"D. Boskovic, Z. Avdagić","doi":"10.1109/BIHTEL.2014.6987637","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987637","url":null,"abstract":"This paper presents a XML-based specification of the fuzzy system (FS) with objective to facilitate FS development by separation of the Fuzzy Inference System (FIS) implementation and a problem domain description. Generic FIS application is implemented in Java, and XML schema for domain knowledge specification is developed. Study case supporting the experimental evaluation of the proposed solution is software quality evaluation.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117061351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing maximum shared risk link group disjoint path algorithm using NVIDIA CUDA heterogeneous parallel programming platform 基于NVIDIA CUDA异构并行编程平台优化最大共享风险链路组不相交路径算法
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987645
V. Miletić, Tomislav Šubić, B. Mikac
Network availability is an essential feature of an optical telecommunication network. Should a failure of a network component occur, be it a link or a component inside a node, network control plane must be able to detect the failure and reroute the traffic using spare components until a repair is done. Shared risk link groups (SRLGs) are used to describe a situation where seemingly unrelated logical failures happen due to a single physical failure. For example, two or more links might share a bridge crossing; should a failure happen, all of them will be damaged. Routing algorithms were proposed to ensure working and spare paths of a connection in a network are SRLG-disjoint to avoid such common cause failures. However, complete SRLG-disjointness of working and spare path is not always possible due to limited number of links or limited capacity available in the network, so maximum SRLG-disjoint paths algorithm is taken instead. Maximum SRLG-disjoint path problem is in general NP-hard. In terms of solution quality greedy algorithms for maximum SRLG-disjoint path problem are as good as more complicated heuristics. To improve the performance of maximum SRLG-disjoint path greedy algorithm, it was implemented using NVIDIA CUDA heterogeneous parallel programming platform and executed on graphics processing unit. The implementation of maximum SRLG-disjoint path algorithm on GPU increases performance significantly compared to implementation utilizing only CPU, especially in simulations of large networks.
网络可用性是光通信网络的一个基本特征。如果网络组件发生故障,无论是链路还是节点内的组件,网络控制平面必须能够检测到故障并使用备用组件重新路由流量,直到完成修复。共享风险链接组(SRLGs)用于描述由于单个物理故障而发生看似无关的逻辑故障的情况。例如,两个或多个链接可能共享一个桥梁交叉点;如果发生故障,所有这些都将被损坏。为了避免这种共因故障,提出了一种路由算法,以确保网络中一个连接的工作路径和备用路径是srlg不相交的。但是,由于网络中可用的链路数量或容量有限,工作路径和备用路径并不总是完全的srlg - disjointways,因此采用最大srlg - disjointpaths算法。最大srlg -不相交路径问题一般是np困难问题。在解质量方面,贪心算法对最大srlg -不相交路径问题的求解与更复杂的启发式算法一样好。为了提高最大srlg -不相交路径贪心算法的性能,在NVIDIA CUDA异构并行编程平台上实现了该算法,并在图形处理单元上执行。与仅利用CPU的实现相比,在GPU上实现最大srlg -不相交路径算法显着提高了性能,特别是在大型网络的模拟中。
{"title":"Optimizing maximum shared risk link group disjoint path algorithm using NVIDIA CUDA heterogeneous parallel programming platform","authors":"V. Miletić, Tomislav Šubić, B. Mikac","doi":"10.1109/BIHTEL.2014.6987645","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987645","url":null,"abstract":"Network availability is an essential feature of an optical telecommunication network. Should a failure of a network component occur, be it a link or a component inside a node, network control plane must be able to detect the failure and reroute the traffic using spare components until a repair is done. Shared risk link groups (SRLGs) are used to describe a situation where seemingly unrelated logical failures happen due to a single physical failure. For example, two or more links might share a bridge crossing; should a failure happen, all of them will be damaged. Routing algorithms were proposed to ensure working and spare paths of a connection in a network are SRLG-disjoint to avoid such common cause failures. However, complete SRLG-disjointness of working and spare path is not always possible due to limited number of links or limited capacity available in the network, so maximum SRLG-disjoint paths algorithm is taken instead. Maximum SRLG-disjoint path problem is in general NP-hard. In terms of solution quality greedy algorithms for maximum SRLG-disjoint path problem are as good as more complicated heuristics. To improve the performance of maximum SRLG-disjoint path greedy algorithm, it was implemented using NVIDIA CUDA heterogeneous parallel programming platform and executed on graphics processing unit. The implementation of maximum SRLG-disjoint path algorithm on GPU increases performance significantly compared to implementation utilizing only CPU, especially in simulations of large networks.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130743601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predicting Quality of Web Service using IKS hybrid model 基于IKS混合模型的Web服务质量预测
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987636
B. Trstenjak, D. Donko
Internet and various services offered by it has become a daily routine. The Quality of Web Service (QWS) has become a significant factor in distinguishing the success of service providers. The main purpose of this paper is to analyze quality prediction using the IKS hybrid model with a new approach of data classification. We present the IKS hybrid model. The model combines selection of features, clustering and classification techniques. Three techniques are used (Information Gain (IG), K-means and Support Vector Machine (SVM)) over QWS dataset with collected 5,000 Web services. Our experiments and test results show that the proposed hybrid approach has achieved promising results in predicting the quality of web services and it represents a good basis for further development and research.
互联网及其提供的各种服务已经成为日常生活的一部分。Web服务质量(QWS)已经成为区分服务提供者成功与否的一个重要因素。本文的主要目的是利用IKS混合模型和一种新的数据分类方法来分析质量预测。我们提出了IKS混合模型。该模型结合了特征选择、聚类和分类技术。在收集了5000个Web服务的QWS数据集上使用了三种技术(信息增益(IG), K-means和支持向量机(SVM))。实验和测试结果表明,本文提出的混合方法在预测web服务质量方面取得了良好的效果,为进一步的开发和研究奠定了良好的基础。
{"title":"Predicting Quality of Web Service using IKS hybrid model","authors":"B. Trstenjak, D. Donko","doi":"10.1109/BIHTEL.2014.6987636","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987636","url":null,"abstract":"Internet and various services offered by it has become a daily routine. The Quality of Web Service (QWS) has become a significant factor in distinguishing the success of service providers. The main purpose of this paper is to analyze quality prediction using the IKS hybrid model with a new approach of data classification. We present the IKS hybrid model. The model combines selection of features, clustering and classification techniques. Three techniques are used (Information Gain (IG), K-means and Support Vector Machine (SVM)) over QWS dataset with collected 5,000 Web services. Our experiments and test results show that the proposed hybrid approach has achieved promising results in predicting the quality of web services and it represents a good basis for further development and research.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":" 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113951202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Teaching application development for RFID/ZigBee networks using open source hardware 基于开源硬件的RFID/ZigBee网络教学应用开发
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987641
D. Dobrilović, Ž. Stojanov, B. Odadzic
Concepts related to Wireless Sensor Networks (WSN), Machine-to-Machine (M2M) and the Internet of Things (IoT) have recently gained significant attention in university education. According to this, the need for low-cost, modular, easy-to-use and scalable platform used for building various network systems in order to provide an environment for developing and testing software applications for WSN, IoT and related technologies is very high. This paper presents an approach in creating platform based on open source hardware designed to provide an infrastructure for teaching development of software applications for WSN, in this case applications for RFID/ZigBee networks, to be used in Computing education and profession.
最近,与无线传感器网络(WSN)、机器对机器(M2M)和物联网(IoT)相关的概念在大学教育中得到了极大的关注。因此,需要低成本、模块化、易于使用和可扩展的平台来构建各种网络系统,为WSN、IoT及相关技术的软件应用开发和测试提供一个环境。本文提出了一种基于开源硬件创建平台的方法,旨在为WSN软件应用的教学开发提供基础设施,在这种情况下应用于RFID/ZigBee网络,用于计算教育和专业。
{"title":"Teaching application development for RFID/ZigBee networks using open source hardware","authors":"D. Dobrilović, Ž. Stojanov, B. Odadzic","doi":"10.1109/BIHTEL.2014.6987641","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987641","url":null,"abstract":"Concepts related to Wireless Sensor Networks (WSN), Machine-to-Machine (M2M) and the Internet of Things (IoT) have recently gained significant attention in university education. According to this, the need for low-cost, modular, easy-to-use and scalable platform used for building various network systems in order to provide an environment for developing and testing software applications for WSN, IoT and related technologies is very high. This paper presents an approach in creating platform based on open source hardware designed to provide an infrastructure for teaching development of software applications for WSN, in this case applications for RFID/ZigBee networks, to be used in Computing education and profession.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cascade SMC control of Ćuk converter for telecommunication systems power supply 电信系统电源Ćuk变换器的串级SMC控制
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987649
Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic
This paper gives one possible application of Ćuk converter for telecommunication equipment power supply. Ćuk converter is controlled with cascade control system, with two regualtion loops, outer loop is voltage PI control loop and inner loop is current SMC (Sliding Mode Control) controlled loop. The control system also has input inductor current limiter, which is necessary in cases of large input currents. Simulation results show good control in cases of input voltage test signals with high frequency ripple and slow changes.
本文给出了Ćuk变换器在通信设备电源中的一种可能应用。Ćuk变换器采用串级控制系统,有两个调节回路,外环为电压PI控制回路,内环为电流SMC(滑模控制)控制回路。控制系统还具有输入电感限流器,这在输入电流大的情况下是必要的。仿真结果表明,在输入电压测试信号具有高频纹波且变化缓慢的情况下,控制效果良好。
{"title":"Cascade SMC control of Ćuk converter for telecommunication systems power supply","authors":"Lejla Ahmethodžić, N. Hadzimejlic, Adnan Ahmethodzic","doi":"10.1109/BIHTEL.2014.6987649","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987649","url":null,"abstract":"This paper gives one possible application of Ćuk converter for telecommunication equipment power supply. Ćuk converter is controlled with cascade control system, with two regualtion loops, outer loop is voltage PI control loop and inner loop is current SMC (Sliding Mode Control) controlled loop. The control system also has input inductor current limiter, which is necessary in cases of large input currents. Simulation results show good control in cases of input voltage test signals with high frequency ripple and slow changes.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131068198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Volterra kernels extraction from neural networks for amplifier behavioral modeling 基于神经网络的Volterra核提取放大器行为建模
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987646
Jelena Misic, V. Markovic, Z. Marinković
In wireless communication systems the amplifier non-linear distortion problems are extremely challenging. The linearization techniques based on behavioral models of amplifiers, seem to be very promising, therefore developing a suitable non-linear model is of the crucial importance. A rigorous approach for non-linear modeling is using the of Volterra series, however the calculation of the Volterra coefficients is a complex and time-consuming task. In this paper, an easy and advanced approach for extraction of the Volterra kernels will be presented. The third order Volterra kernels are derived from the parameters of a feed-forward time delay neural network with a suitable activation function.
在无线通信系统中,放大器的非线性失真问题是一个极具挑战性的问题。基于放大器行为模型的线性化技术似乎非常有前途,因此建立一个合适的非线性模型至关重要。一种严谨的非线性建模方法是使用Volterra级数,然而Volterra系数的计算是一项复杂且耗时的任务。在本文中,将提出一种简单而先进的方法来提取Volterra核。利用具有合适激活函数的前馈时滞神经网络的参数推导出三阶Volterra核。
{"title":"Volterra kernels extraction from neural networks for amplifier behavioral modeling","authors":"Jelena Misic, V. Markovic, Z. Marinković","doi":"10.1109/BIHTEL.2014.6987646","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987646","url":null,"abstract":"In wireless communication systems the amplifier non-linear distortion problems are extremely challenging. The linearization techniques based on behavioral models of amplifiers, seem to be very promising, therefore developing a suitable non-linear model is of the crucial importance. A rigorous approach for non-linear modeling is using the of Volterra series, however the calculation of the Volterra coefficients is a complex and time-consuming task. In this paper, an easy and advanced approach for extraction of the Volterra kernels will be presented. The third order Volterra kernels are derived from the parameters of a feed-forward time delay neural network with a suitable activation function.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128993400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Feedforward carrier estimation method for bpsk with large Doppler shift 大多普勒频移bpsk的前馈载波估计方法
Pub Date : 2014-12-18 DOI: 10.1109/BIHTEL.2014.6987643
A. Semenova, A. Tikhomirov
In the paper a new method based on feedforward carrier estimation circuit is described for BPSK carrier synchronization. Simulation of model based on proposed method shows comparable performance with square-law and Costas loop feedback circuits in small frequency shift conditions in AWGN channel, but operates in a frequency range up to 10% of symbol rate with slowly degrading BER comparing to maximum tracking range of 3% of symbol rate for feedback circuits. Due to its wide frequency band and implementation simplicity, proposed circuit is recommended for using in the communication BPSK systems with large Doppler shift.
本文提出了一种基于前馈载波估计电路的BPSK载波同步新方法。基于该方法的模型仿真表明,在AWGN信道的小频移条件下,该方法与平方律反馈电路和Costas环路反馈电路的性能相当,但与反馈电路的最大跟踪范围为3%的符号率相比,该方法工作在高达10%的符号率频率范围内,误码率下降缓慢。该电路频带宽,实现简单,适用于多普勒频移较大的BPSK通信系统。
{"title":"Feedforward carrier estimation method for bpsk with large Doppler shift","authors":"A. Semenova, A. Tikhomirov","doi":"10.1109/BIHTEL.2014.6987643","DOIUrl":"https://doi.org/10.1109/BIHTEL.2014.6987643","url":null,"abstract":"In the paper a new method based on feedforward carrier estimation circuit is described for BPSK carrier synchronization. Simulation of model based on proposed method shows comparable performance with square-law and Costas loop feedback circuits in small frequency shift conditions in AWGN channel, but operates in a frequency range up to 10% of symbol rate with slowly degrading BER comparing to maximum tracking range of 3% of symbol rate for feedback circuits. Due to its wide frequency band and implementation simplicity, proposed circuit is recommended for using in the communication BPSK systems with large Doppler shift.","PeriodicalId":415492,"journal":{"name":"2014 X International Symposium on Telecommunications (BIHTEL)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123056302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 X International Symposium on Telecommunications (BIHTEL)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1