Cloud-based radio access networks (C-RANs) are an emerging technology for 5G cellular networks. The increasing demand for radio resources causes many challenges in managing resources, such as power and interference management, user association, and spectrum allocation. This study aims to handle resource allocation challenges. We propose a novel model to maximize channel utilization by employing an auction mechanism applied in the C-RAN framework. We provide an unit-based allocation considering users’ maximum and minimum demands. We expect that the proposed schema will increase auctioneer revenue, maximize channel utilization, and maximize user satisfaction while meeting users’ demands. Moreover, we conduct a comparison between the proposed schema and the previous standard method. The results of the comparison show that the proposed scenarios increased the spectrum utilization by 66%, maximized revenue by 166%, increased the user satisfaction by 22%, and increased Jain’s fairness index by 17%. Consequently, these outcomes prove the effectiveness of the proposed method. A plan to find the optimal values for simulation parameters to get better results by applying a different winner determination problem (WDP) strategy is considered as future work.
{"title":"An auction-based resource allocation in Cloud Radio Access Network (C-RAN)","authors":"Samaher AL KHUZAIM, Enas F. Khairullah, S. Buhari","doi":"10.33436/v31i4y202106","DOIUrl":"https://doi.org/10.33436/v31i4y202106","url":null,"abstract":"Cloud-based radio access networks (C-RANs) are an emerging technology for 5G cellular networks. The increasing demand for radio resources causes many challenges in managing resources, such as power and interference management, user association, and spectrum allocation. This study aims to handle resource allocation challenges. We propose a novel model to maximize channel utilization by employing an auction mechanism applied in the C-RAN framework. We provide an unit-based allocation considering users’ maximum and minimum demands. We expect that the proposed schema will increase auctioneer revenue, maximize channel utilization, and maximize user satisfaction while meeting users’ demands. Moreover, we conduct a comparison between the proposed schema and the previous standard method. The results of the comparison show that the proposed scenarios increased the spectrum utilization by 66%, maximized revenue by 166%, increased the user satisfaction by 22%, and increased Jain’s fairness index by 17%. Consequently, these outcomes prove the effectiveness of the proposed method. A plan to find the optimal values for simulation parameters to get better results by applying a different winner determination problem (WDP) strategy is considered as future work.","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analiza comparativă a trei platforme de e-Learning utilizate de către studenți în perioada pandemiei de COVID-19","authors":"Dragos Daniel Iordache, Monica Barbu","doi":"10.33436/v31i4y202105","DOIUrl":"https://doi.org/10.33436/v31i4y202105","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48142273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Full video Encryption has been established as the most suitable technique to guarantee the security of digital video data during transmission but cannot be widely adopted because of its large disk space and long processing time. Therefore, this paper aims at reducing the computational space complexity using Residue Number System (RNS). MPEG IV algorithm and encryption of pixel values using the traditional RNS moduli set were employed for the encryption while a modified reverse converter was used for decryption. JAVA was used for the implementation while an evaluation was performed to compare the disk size of the cipher and deciphered videos. The scheme outperformed the existing evaluated cryptosystems in terms of cipher size and the decrypted videos increased by 49% when compared with the original video. The space computational complexity problem in full video encryption was adequately reduced using RNS. It is recommended that RNS should be used for securing video transmission and storage.
{"title":"Application of Residue Number Systems in enhancing the transmission of secured videos","authors":"A. N. Babatunde, A. Oloyede","doi":"10.33436/v31i4y202108","DOIUrl":"https://doi.org/10.33436/v31i4y202108","url":null,"abstract":"Full video Encryption has been established as the most suitable technique to guarantee the security of digital video data during transmission but cannot be widely adopted because of its large disk space and long processing time. Therefore, this paper aims at reducing the computational space complexity using Residue Number System (RNS). MPEG IV algorithm and encryption of pixel values using the traditional RNS moduli set were employed for the encryption while a modified reverse converter was used for decryption. JAVA was used for the implementation while an evaluation was performed to compare the disk size of the cipher and deciphered videos. The scheme outperformed the existing evaluated cryptosystems in terms of cipher size and the decrypted videos increased by 49% when compared with the original video. The space computational complexity problem in full video encryption was adequately reduced using RNS. It is recommended that RNS should be used for securing video transmission and storage.","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Connecting rural India to modernised healthcare facilities through telemedicine has been a long-time vision of the Government of India. Telemedicine provides continuity of care to patients keeping the doctor-patient interaction alive. This study aims to explore telemedicine and its ever-growing trend. The journey of its evolution from a doubtful start to its current position is examined in this study. A systematic electronic search for articles available between 2014 to 2020 using MEDLINE, EMBASE, Cochrane Database and Google Scholar was performed using PRISMA guidelines. Studies published in English, with free full-text availability and "telemedicine" and "India" used as keywords were included. 126 studies were identified and, after a further analysis, 21 of 44 articles were chosen for assessment. The healthcare industry is largely benefitting from telemedicine. Different fields of medicine have provided successful evaluations and remedies by utilising telemedicine. We found that systematic availability and functioning of ICT, technical infrastructure, data storage systems, standardization of health protocols are few of the challenges faced. COVID 19 has forced the resilience of patients and professional Indians to overcome the barriers and explore telemedicine to achieve quality patient-centric and value-based healthcare. Digitization displays tremendous potential to facilitate a booming practise in telemedicine with suitable training and stringent guidelines.
{"title":"Telemedicine in India - an investment of technology for a digitized healthcare industry: a systematic review","authors":"Varun Verma, Vijaya Krishnan, C. Verma","doi":"10.33436/v31i4y202103","DOIUrl":"https://doi.org/10.33436/v31i4y202103","url":null,"abstract":"Connecting rural India to modernised healthcare facilities through telemedicine has been a long-time vision of the Government of India. Telemedicine provides continuity of care to patients keeping the doctor-patient interaction alive. This study aims to explore telemedicine and its ever-growing trend. The journey of its evolution from a doubtful start to its current position is examined in this study. A systematic electronic search for articles available between 2014 to 2020 using MEDLINE, EMBASE, Cochrane Database and Google Scholar was performed using PRISMA guidelines. Studies published in English, with free full-text availability and \"telemedicine\" and \"India\" used as keywords were included. 126 studies were identified and, after a further analysis, 21 of 44 articles were chosen for assessment. The healthcare industry is largely benefitting from telemedicine. Different fields of medicine have provided successful evaluations and remedies by utilising telemedicine. We found that systematic availability and functioning of ICT, technical infrastructure, data storage systems, standardization of health protocols are few of the challenges faced. COVID 19 has forced the resilience of patients and professional Indians to overcome the barriers and explore telemedicine to achieve quality patient-centric and value-based healthcare. Digitization displays tremendous potential to facilitate a booming practise in telemedicine with suitable training and stringent guidelines.","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47239859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspecte intrinseci ale consolidării e-Guvernării la nivelul Uniunii Europene. Studiu de caz: România","authors":"A. Radu, Ioana Petcu","doi":"10.33436/v31i4y202107","DOIUrl":"https://doi.org/10.33436/v31i4y202107","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the huge amount of information and users of the internet service, it is hard to know quickly and accurately what the user wants. This phenomenon leads to an extremely low utilization of information, also known as the information overload problem. Traditionally, keywords are used to retrieve images, but such methods require a lot of annotations on the image data, which will lead to serious problems such as inconsistent, inaccurate, and incomplete descriptions, and a huge amount of work. To solve this problem, Content Based Information Retrieval (CBIR) has gradually become a research hotspot. CBIR retrieves picture objects based entirely on the content. The content of an image needs to be represented by features that represent its uniqueness. Basically, any picture object can be represented by its specific shapes, colors, and textures. These visual characteristics of the image are used as input conditions for the query system, and a result the system will recommended nearest images and data set. This research designs and implements two-stage deep learning-based model that recommends a clothing fashion style. This model can use deep learning approach to extract various attributes from images with clothes to learn the user's clothing style and preferences. These attributes are provided to the correspondence model to retrieve the contiguous related images for recommendation. Based on data-driven, this thesis uses convolutional neural network as a visual extractor of image objects. This experimental model shows and achieves better results than the ones of the previous schemes.
{"title":"Design and implementation of clothing fashion style recommendation system using deep learning","authors":"M. Khalid, Mao Keming, Tariq Hussain","doi":"10.33436/v31i4y202110","DOIUrl":"https://doi.org/10.33436/v31i4y202110","url":null,"abstract":"In recent years, the huge amount of information and users of the internet service, it is hard to know quickly and accurately what the user wants. This phenomenon leads to an extremely low utilization of information, also known as the information overload problem. Traditionally, keywords are used to retrieve images, but such methods require a lot of annotations on the image data, which will lead to serious problems such as inconsistent, inaccurate, and incomplete descriptions, and a huge amount of work. To solve this problem, Content Based Information Retrieval (CBIR) has gradually become a research hotspot. CBIR retrieves picture objects based entirely on the content. The content of an image needs to be represented by features that represent its uniqueness. Basically, any picture object can be represented by its specific shapes, colors, and textures. These visual characteristics of the image are used as input conditions for the query system, and a result the system will recommended nearest images and data set. This research designs and implements two-stage deep learning-based model that recommends a clothing fashion style. This model can use deep learning approach to extract various attributes from images with clothes to learn the user's clothing style and preferences. These attributes are provided to the correspondence model to retrieve the contiguous related images for recommendation. Based on data-driven, this thesis uses convolutional neural network as a visual extractor of image objects. This experimental model shows and achieves better results than the ones of the previous schemes.","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"128 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proiectarea automată a sistemelor lineare multivariabile compensate","authors":"Adrian Sfarti","doi":"10.33436/v31i4y202101","DOIUrl":"https://doi.org/10.33436/v31i4y202101","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69755050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducere în cadrele Python pentru dezvoltare web","authors":"Flaviu Fuior","doi":"10.33436/v31i3y202108","DOIUrl":"https://doi.org/10.33436/v31i3y202108","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance improvement of the proxy servers’ cache in distributed systems using session and cookie techniques based on game theory","authors":"Bita Jafari, P. Bayat","doi":"10.33436/v31i3y202104","DOIUrl":"https://doi.org/10.33436/v31i3y202104","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Aljahdali, Nawal Alsaidi, Maram M Alsafri, A. Alsulami, Turkia Almutairi
{"title":"Mobile device forensics","authors":"A. Aljahdali, Nawal Alsaidi, Maram M Alsafri, A. Alsulami, Turkia Almutairi","doi":"10.33436/v31i3y202107","DOIUrl":"https://doi.org/10.33436/v31i3y202107","url":null,"abstract":"","PeriodicalId":53877,"journal":{"name":"Romanian Journal of Information Technology and Automatic Control-Revista Romana de Informatica si Automatica","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69754373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}