首页 > 最新文献

2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

英文 中文
Data Updating Models for Priority Vehicles 优先车辆的数据更新模型
A. Shestakov, Yaroslav A. Pletnev, K. A. Frolova
At present, it is quite relevant to search for ways to reduce the cost of deploying and operating infotelecommunication and road urban infrastructure. The existing technologies of message delivery in sensor networks taking into account the positioning of mobile objects are considered, such as GGF, GFR, GGR, LAR, ALARM, LACBER. The paper substantiates the need to study the mechanisms of reducing excessive traffic in hierarchical networks when updating data in highly automated vehicles from the thematic layers of external geoinformation systems. An approach to using advanced filtering procedures for peer-to-peer cluster sensor networks is described. An algorithm for updating data for groups of priority mobile objects is proposed. The authors describe the possibility of using existing analytical and simulation methods to evaluate the proposed improved traffic routing procedures for updating spatial data for priority vehicle that moves in a column. It is proposed to implement an additional unit for the existing simulation model. It takes into account the specifics of priority traffic moving in the convoy.
目前,如何降低信息通信和道路城市基础设施的部署和运营成本是一个非常重要的问题。考虑了现有的考虑移动目标定位的传感器网络消息传递技术,如GGF、GFR、GGR、LAR、ALARM、LACBER等。本文证实了在从外部地理信息系统的主题层更新高度自动化车辆的数据时,需要研究分层网络中减少过度交通的机制。描述了一种使用点对点集群传感器网络的高级过滤程序的方法。提出了一种优先级移动对象分组数据更新算法。作者描述了使用现有的分析和模拟方法来评估提出的改进交通路由程序的可能性,以更新优先车辆在列中移动的空间数据。建议在现有仿真模型的基础上增加一个单元。它考虑了车队中移动的优先交通的具体情况。
{"title":"Data Updating Models for Priority Vehicles","authors":"A. Shestakov, Yaroslav A. Pletnev, K. A. Frolova","doi":"10.1109/ICUMT51630.2020.9222414","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222414","url":null,"abstract":"At present, it is quite relevant to search for ways to reduce the cost of deploying and operating infotelecommunication and road urban infrastructure. The existing technologies of message delivery in sensor networks taking into account the positioning of mobile objects are considered, such as GGF, GFR, GGR, LAR, ALARM, LACBER. The paper substantiates the need to study the mechanisms of reducing excessive traffic in hierarchical networks when updating data in highly automated vehicles from the thematic layers of external geoinformation systems. An approach to using advanced filtering procedures for peer-to-peer cluster sensor networks is described. An algorithm for updating data for groups of priority mobile objects is proposed. The authors describe the possibility of using existing analytical and simulation methods to evaluate the proposed improved traffic routing procedures for updating spatial data for priority vehicle that moves in a column. It is proposed to implement an additional unit for the existing simulation model. It takes into account the specifics of priority traffic moving in the convoy.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guidelines for Using Machine Learning Technology to Ensure Information Security 使用机器学习技术确保信息安全的指南
M. Kovtsur, Anastasia Valerievna Mikhailova, Pavel Andreevich Potemkin, I. Ushakov, A. Krasov
Artificial intelligence is a technology that allows you to automate and optimize any process in all areas of human life. Machine learning allows you to create irreplaceable and highly effective assistants that can perform various actions, even those that cannot always be performed by humans. The use of this technology in the field of information security today is a promising and actual tasks for solution, development and implementation, since every day more and more serious threats to cyberspace appear, new vulnerabilities of web pages and operating systems and even antivirus programs are found, and often a person does not have time to track all of them. This is why using automated assistants to track potential threats and attacks can reduce the risk of breaches and information leaks for virtually any enterprise and company.
人工智能是一种技术,它可以让你自动化和优化人类生活中所有领域的任何过程。机器学习允许您创建不可替代的高效助手,这些助手可以执行各种操作,甚至是那些无法由人类执行的操作。这一技术在当今信息安全领域的应用是一项有前景的、实际的解决、开发和实施任务,因为网络空间每天都会出现越来越严重的威胁,网页和操作系统的新漏洞甚至反病毒程序都会被发现,而一个人往往没有时间去跟踪所有这些漏洞。这就是为什么使用自动化助手来跟踪潜在的威胁和攻击可以降低几乎任何企业和公司的违规和信息泄露风险。
{"title":"Guidelines for Using Machine Learning Technology to Ensure Information Security","authors":"M. Kovtsur, Anastasia Valerievna Mikhailova, Pavel Andreevich Potemkin, I. Ushakov, A. Krasov","doi":"10.1109/ICUMT51630.2020.9222417","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222417","url":null,"abstract":"Artificial intelligence is a technology that allows you to automate and optimize any process in all areas of human life. Machine learning allows you to create irreplaceable and highly effective assistants that can perform various actions, even those that cannot always be performed by humans. The use of this technology in the field of information security today is a promising and actual tasks for solution, development and implementation, since every day more and more serious threats to cyberspace appear, new vulnerabilities of web pages and operating systems and even antivirus programs are found, and often a person does not have time to track all of them. This is why using automated assistants to track potential threats and attacks can reduce the risk of breaches and information leaks for virtually any enterprise and company.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116203006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cellular-enabled Wearables in Public Safety Networks: State of the Art and Performance Evaluation 公共安全网络中支持蜂窝的可穿戴设备:最新技术和性能评估
Salwa Saafi, Jiri Hosek, Aneta Kolackova
With the aim of offering services and products that ensure the safety of people and properties, public safety organizations are responsible for providing the first responders, i.e., police officers, firefighters, and emergency medical service workers, with devices and communication systems that help them exchange time-sensitive and critical information. To address the mission-critical requirements and to target new broadband public safety applications, these organizations started migrating from traditional land mobile radio towards cellular communication systems with the consideration of a new set of deployed devices, such as wearables. In this paper, we first provide a state of the art overview of the features that are introduced by the 3rd Generation Partnership Project (3GPP) and that can be used for public safety services. Second, we discuss the role of wearable devices, more precisely cellular-enabled wearables, in creating several new use cases as part of the concept of the Internet of Life Saving Things. Finally, we conduct a performance evaluation of a mission-critical service using cellular-enabled wearables, specifically a mission-critical push-to-talk (MCPTT) application using LTE Cat-M2-enabled smartwatches. In this evaluation, we examine the impact of different parameters related to the wearable device capabilities and the MCPTT call scenarios on the key performance indicator defined by 3GPP for this type of applications, which is the MCPTT access time.
为了提供确保人员和财产安全的服务和产品,公共安全组织负责为第一响应者(即警察、消防员和紧急医疗服务人员)提供设备和通信系统,帮助他们交换时间敏感的关键信息。为了满足关键任务需求,并针对新的宽带公共安全应用,这些组织开始从传统的陆地移动无线电转向蜂窝通信系统,并考虑一组新的部署设备,如可穿戴设备。在本文中,我们首先提供了第三代合作伙伴计划(3GPP)引入的可用于公共安全服务的功能的最新概况。其次,我们讨论了可穿戴设备的作用,更确切地说,是支持蜂窝的可穿戴设备,在创建几个新的用例中,作为拯救生命的物联网概念的一部分。最后,我们使用支持蜂窝的可穿戴设备对关键任务服务进行了性能评估,特别是使用支持LTE cat - m2的智能手表的关键任务一键通(MCPTT)应用。在本次评估中,我们研究了与可穿戴设备功能和MCPTT呼叫场景相关的不同参数对3GPP为此类应用定义的关键性能指标(MCPTT访问时间)的影响。
{"title":"Cellular-enabled Wearables in Public Safety Networks: State of the Art and Performance Evaluation","authors":"Salwa Saafi, Jiri Hosek, Aneta Kolackova","doi":"10.1109/ICUMT51630.2020.9222459","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222459","url":null,"abstract":"With the aim of offering services and products that ensure the safety of people and properties, public safety organizations are responsible for providing the first responders, i.e., police officers, firefighters, and emergency medical service workers, with devices and communication systems that help them exchange time-sensitive and critical information. To address the mission-critical requirements and to target new broadband public safety applications, these organizations started migrating from traditional land mobile radio towards cellular communication systems with the consideration of a new set of deployed devices, such as wearables. In this paper, we first provide a state of the art overview of the features that are introduced by the 3rd Generation Partnership Project (3GPP) and that can be used for public safety services. Second, we discuss the role of wearable devices, more precisely cellular-enabled wearables, in creating several new use cases as part of the concept of the Internet of Life Saving Things. Finally, we conduct a performance evaluation of a mission-critical service using cellular-enabled wearables, specifically a mission-critical push-to-talk (MCPTT) application using LTE Cat-M2-enabled smartwatches. In this evaluation, we examine the impact of different parameters related to the wearable device capabilities and the MCPTT call scenarios on the key performance indicator defined by 3GPP for this type of applications, which is the MCPTT access time.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123197965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Technical Perspectives of Contact-Tracing Applications on Wearables for COVID-19 Control 可穿戴设备在新冠肺炎防控中的接触者追踪应用技术展望
Viktoriia Shubina, A. Ometov, E. Lohan
The wearables’ market is rapidly evolving, with applications ranging from healthcare and activity monitoring to emerging domains such as drones and haptic helmets. Wearable-based contact tracing is gaining increased attention in the COVID-19 era for more efficient disease prevention. Therefore, it is of timely relevance to identify the leading existing wireless contact-tracing solutions and their suitability for wearables. Existing trade-offs of contact-tracing applications require a thorough analysis of technical capabilities, such as accuracy, energy consumption, availability, sources of errors when dealing with wireless channels, privacy challenges, and deterrents towards a large-scale adoption on the wearables market. Based on extensive literature research, we conclude that decentralized architectures generally offer a better place in a trade-off in terms of accuracy and user eagerness to adopt them, taking into account privacy considerations, compared to centralized approaches. Our paper provides a brief technical overview of the existing solutions deployed for contact tracing, defines main principles that affect the overall efficacy of digital contact tracing, and presents a discussion on the potential effect of wearables in tackling the spread of a highly contagious virus.
可穿戴设备市场正在迅速发展,应用范围从医疗保健和活动监测到无人机和触觉头盔等新兴领域。在COVID-19时代,为了更有效地预防疾病,基于可穿戴设备的接触者追踪越来越受到关注。因此,确定现有领先的无线接触追踪解决方案及其对可穿戴设备的适用性是及时相关的。接触追踪应用程序的现有权衡需要对技术能力进行彻底的分析,例如准确性、能耗、可用性、处理无线通道时的错误来源、隐私挑战以及对可穿戴设备市场大规模采用的威慑。基于广泛的文献研究,我们得出结论,与集中式方法相比,在考虑隐私因素的情况下,去中心化架构通常在准确性和用户采用它们的渴望方面提供了更好的权衡。我们的论文简要概述了用于接触者追踪的现有解决方案,定义了影响数字接触者追踪整体功效的主要原则,并讨论了可穿戴设备在应对高传染性病毒传播方面的潜在影响。
{"title":"Technical Perspectives of Contact-Tracing Applications on Wearables for COVID-19 Control","authors":"Viktoriia Shubina, A. Ometov, E. Lohan","doi":"10.1109/ICUMT51630.2020.9222246","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222246","url":null,"abstract":"The wearables’ market is rapidly evolving, with applications ranging from healthcare and activity monitoring to emerging domains such as drones and haptic helmets. Wearable-based contact tracing is gaining increased attention in the COVID-19 era for more efficient disease prevention. Therefore, it is of timely relevance to identify the leading existing wireless contact-tracing solutions and their suitability for wearables. Existing trade-offs of contact-tracing applications require a thorough analysis of technical capabilities, such as accuracy, energy consumption, availability, sources of errors when dealing with wireless channels, privacy challenges, and deterrents towards a large-scale adoption on the wearables market. Based on extensive literature research, we conclude that decentralized architectures generally offer a better place in a trade-off in terms of accuracy and user eagerness to adopt them, taking into account privacy considerations, compared to centralized approaches. Our paper provides a brief technical overview of the existing solutions deployed for contact tracing, defines main principles that affect the overall efficacy of digital contact tracing, and presents a discussion on the potential effect of wearables in tackling the spread of a highly contagious virus.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
On the generation of Pulse OFDM signals 关于脉冲OFDM信号的产生
M. Bakulin, V. Kreyndelin, D. Petrov, S. Melnik
High peak-to-average power ratio (PAPR) is one of the disadvantages of OFDM transmitters with linear amplifiers. However, many of the existing PAPR reduction algorithms decrease spectral efficiency but do not bring any significant reduction in power consumption. This problem can be solved by the utilization of transmitters that are generating a signal as a sequence of pulses. In this paper, we describe a method for generating the pulse signal by converting the original OFDM signal into a signal on a rectangular carrier. It is demonstrated that the constructed Pulse OFDM signal can be received with a conventional OFDM receiver.
高峰均功率比(PAPR)是带线性放大器的OFDM发射机的缺点之一。然而,许多现有的PAPR降低算法降低了频谱效率,但并没有带来任何显著的功耗降低。这个问题可以通过利用作为脉冲序列产生信号的发射机来解决。在本文中,我们描述了一种通过将原始OFDM信号转换成矩形载波上的信号来产生脉冲信号的方法。实验结果表明,所构建的脉冲OFDM信号可以被传统的OFDM接收机接收。
{"title":"On the generation of Pulse OFDM signals","authors":"M. Bakulin, V. Kreyndelin, D. Petrov, S. Melnik","doi":"10.1109/ICUMT51630.2020.9222242","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222242","url":null,"abstract":"High peak-to-average power ratio (PAPR) is one of the disadvantages of OFDM transmitters with linear amplifiers. However, many of the existing PAPR reduction algorithms decrease spectral efficiency but do not bring any significant reduction in power consumption. This problem can be solved by the utilization of transmitters that are generating a signal as a sequence of pulses. In this paper, we describe a method for generating the pulse signal by converting the original OFDM signal into a signal on a rectangular carrier. It is demonstrated that the constructed Pulse OFDM signal can be received with a conventional OFDM receiver.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128393423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pitfalls of LPWA Power Consumption: Hands-On Design of Current Probe 低功耗广域网功耗陷阱:电流探头的实际设计
Radek Mozny, Pavel Mašek, Martin Stusek, Michal Mikulasek, A. Ometov, Jiri Hosek
The unique opportunities introduced by the emerging Industrial Internet of Things (IIoT) applications have accelerated the momentum of the massive Machine-Type Communications (mMTC) worldwide. As the number of already deployed Low-Power Wide-Area (LPWA) applications growth exponentially over the last decade, new open challenges started to be discussed across the industry sector. The most critical parameter of the LWPA devices in question is energy efficiency and the overall power consumption of designed end-devices. Therefore, the need for precise measurement of power consumption has attracted engineers’ attention as the unique communication parameters of the LPWA devices form the current consumption measurements challenging task. To facilitate accurate current measurements ranging between hundreds of nA and hundreds of µA, we propose a unique design of the current probe prototype. We then demonstrate the obtained results concerning the accuracy, measurement range switching, and sufficient sampling speed. All the measurements from the designed prototype are further compared with the industry-grade DC power analyzer Agilent N6705B.
新兴工业物联网(IIoT)应用带来的独特机遇加速了全球大规模机器类型通信(mMTC)的发展势头。随着低功耗广域(LPWA)应用的数量在过去十年中呈指数级增长,整个行业开始讨论新的开放挑战。所讨论的LWPA器件的最关键参数是能量效率和所设计的终端器件的总功耗。因此,精确测量功耗的需求引起了工程师们的关注,因为LPWA设备独特的通信参数构成了当前功耗测量的挑战任务。为了便于在数百nA和数百μ A之间进行精确的电流测量,我们提出了一种独特的电流探头原型设计。然后,我们演示了有关精度,测量范围切换和足够的采样速度的结果。所有设计原型的测量结果都与工业级直流功率分析仪Agilent N6705B进行了进一步比较。
{"title":"Pitfalls of LPWA Power Consumption: Hands-On Design of Current Probe","authors":"Radek Mozny, Pavel Mašek, Martin Stusek, Michal Mikulasek, A. Ometov, Jiri Hosek","doi":"10.1109/ICUMT51630.2020.9222449","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222449","url":null,"abstract":"The unique opportunities introduced by the emerging Industrial Internet of Things (IIoT) applications have accelerated the momentum of the massive Machine-Type Communications (mMTC) worldwide. As the number of already deployed Low-Power Wide-Area (LPWA) applications growth exponentially over the last decade, new open challenges started to be discussed across the industry sector. The most critical parameter of the LWPA devices in question is energy efficiency and the overall power consumption of designed end-devices. Therefore, the need for precise measurement of power consumption has attracted engineers’ attention as the unique communication parameters of the LPWA devices form the current consumption measurements challenging task. To facilitate accurate current measurements ranging between hundreds of nA and hundreds of µA, we propose a unique design of the current probe prototype. We then demonstrate the obtained results concerning the accuracy, measurement range switching, and sufficient sampling speed. All the measurements from the designed prototype are further compared with the industry-grade DC power analyzer Agilent N6705B.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129703076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of wireless fake access points 检测无线假接入点
Norbert Lovinger, Tomas Gerlich, Zdenek Martinasek, L. Malina
Wireless networks have become a common part of everyone’s life who wants to connect to the Internet network. Despite the rapid development of wireless technologies, common users still do not pay much attention to the security questions. One of the most challenging security problems of Wi-Fi networks is to detect and prevent the fake access point attack. Existing solutions require the installation of proprietary hardware, protocol changes, measuring frame characteristics etc. Moreover, these solutions are strictly focused on an individual cyber attack detection. In this work, we propose our method that detects a fake access point and that allows the detection of multiple cyber attacks in local wireless networks. In our research, we focus on the detection of the fake access point attack, the KARMA attack, the frequency congestion attack and the de-authentication attack.
无线网络已经成为每个想要连接到互联网的人生活中常见的一部分。尽管无线技术发展迅速,但普通用户对其安全问题仍然不太重视。检测和防止假接入点攻击是Wi-Fi网络最具挑战性的安全问题之一。现有的解决方案需要安装专有硬件、更改协议、测量框架特性等。此外,这些解决方案严格专注于单个网络攻击检测。在这项工作中,我们提出了检测假接入点的方法,并允许检测本地无线网络中的多个网络攻击。在我们的研究中,我们重点研究了假接入点攻击、KARMA攻击、频率拥塞攻击和去认证攻击的检测。
{"title":"Detection of wireless fake access points","authors":"Norbert Lovinger, Tomas Gerlich, Zdenek Martinasek, L. Malina","doi":"10.1109/ICUMT51630.2020.9222455","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222455","url":null,"abstract":"Wireless networks have become a common part of everyone’s life who wants to connect to the Internet network. Despite the rapid development of wireless technologies, common users still do not pay much attention to the security questions. One of the most challenging security problems of Wi-Fi networks is to detect and prevent the fake access point attack. Existing solutions require the installation of proprietary hardware, protocol changes, measuring frame characteristics etc. Moreover, these solutions are strictly focused on an individual cyber attack detection. In this work, we propose our method that detects a fake access point and that allows the detection of multiple cyber attacks in local wireless networks. In our research, we focus on the detection of the fake access point attack, the KARMA attack, the frequency congestion attack and the de-authentication attack.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVM 将机器学习应用于LTE流量预测:Bagging, Random Forest和SVM的比较
Nikolai Stepanov, D. Alekseeva, A. Ometov, E. Lohan
Today, a significant share of smartphone applications use Artificial Intelligence (AI) elements that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied to the Edge paradigm aiming to predict and optimize the network load conventionally caused by human-based traffic, which is growing each year rapidly. The application of both standard and deep ML techniques is expected to improve the networks’ operation in the most complex heterogeneous environment. In this work, we propose a method to predict the LTE network edge traffic by utilizing various ML techniques. The analysis is based on the public cellular traffic dataset, and it presents a comparison of the quality metrics. The Support Vector Machines method allows much faster training than the Bagging and Random Forest that operate well with a mixture of numerical and categorical features.
如今,很大一部分智能手机应用程序使用人工智能(AI)元素,而这些元素又基于机器学习(ML)原则。特别是,机器学习也应用于边缘范式,旨在预测和优化每年快速增长的基于人为的流量通常引起的网络负载。标准和深度机器学习技术的应用有望改善网络在最复杂的异构环境中的运行。在这项工作中,我们提出了一种利用各种机器学习技术预测LTE网络边缘流量的方法。该分析基于公共蜂窝流量数据集,并给出了质量指标的比较。与Bagging和Random Forest相比,支持向量机方法的训练速度要快得多,后者可以很好地处理数字和分类特征的混合。
{"title":"Applying Machine Learning to LTE Traffic Prediction: Comparison of Bagging, Random Forest, and SVM","authors":"Nikolai Stepanov, D. Alekseeva, A. Ometov, E. Lohan","doi":"10.1109/ICUMT51630.2020.9222418","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222418","url":null,"abstract":"Today, a significant share of smartphone applications use Artificial Intelligence (AI) elements that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied to the Edge paradigm aiming to predict and optimize the network load conventionally caused by human-based traffic, which is growing each year rapidly. The application of both standard and deep ML techniques is expected to improve the networks’ operation in the most complex heterogeneous environment. In this work, we propose a method to predict the LTE network edge traffic by utilizing various ML techniques. The analysis is based on the public cellular traffic dataset, and it presents a comparison of the quality metrics. The Support Vector Machines method allows much faster training than the Bagging and Random Forest that operate well with a mixture of numerical and categorical features.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127367475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1