default search action
13th ICUMT 2021: Brno, Czech Republic
- 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, ICUMT 2021, Brno, Czech Republic, October 25-27, 2021. IEEE 2021, ISBN 978-1-6654-0219-4
- Waleed Bin Qaim, Aleksandr Ometov, Claudia Campolo, Antonella Molinaro, Elena Simona Lohan, Jari Nurmi:
Understanding the Performance of Task Offloading for Wearables in a Two-Tier Edge Architecture. 1-9 - Ivan I. Tsitovich:
Mathematical Modelling of Group Polling Method in Structured Wireless Sensor Networks for Very Rare Events Detecting. 10-15 - Konstantin Mikhaylov:
On the Uplink Traffic Distribution in Time for Duty-cycle Constrained LoRaWAN Networks. 16-21 - Sergej Jakovlev, Mindaugas Jusis, Tomas Eglynas, Miroslav Voznák, Jaromir Tovarek, Pavol Partila:
Application of a Mobile LoRaWAN System in a Container Terminal to Collect Sensory Data. 22-26 - Samira Homayouni, Mario Paier, Christian Benischek, Gerhard Pernjak, Markus Leinwather, Matthias Reichelt, Christoph Fuchsjäger:
On the Effect of Cellular-Connected Drones on Terrestrial Users: Field Trials. 27-31 - Christos Bouras, Vasileios Kokkinos, Georgios Tzioumanis:
Using NOMA Scheme for the Management of Interference and the Improvement of Performance in 5G Networks. 32-37 - Aneta Kolackova, Jiri Hosek, Jan Jerabek, Pavel Masek:
Experimental Verification of Segment Routing Methods in 5G+ Mobile Transport Networks. 38-43 - Tan-Jan Ho, Meng-Hxien Wu, Wei-Chung Lin:
Mobile Localization in Random NLOS Settings Using Improved Particle Filtering. 44-49 - Fábio Gonçalves, Joaquim Macedo, Alexandre J. T. Santos:
Intelligent Hierarchical Intrusion Detection System for VANETs. 50-59 - Arnav Kumar, Rakesh Chandra Joshi, Malay Kishore Dutta, Martin Jonak, Radim Burget:
Fruit-CNN: An Efficient Deep learning-based Fruit Classification and Quality Assessment for Precision Agriculture. 60-65 - Stepan Jezek, Martin Jonak, Radim Burget, Pavel Dvorak, Milos Skotak:
Deep learning-based defect detection of metal parts: evaluating current methods in complex conditions. 66-71 - Anna Gaydamaka, Natalia Yarkina, Viktoriia Khalina, Dmitri Moltchanov:
Comparison of Machine Learning Algorithms for Priority-Based Network Slicing in 5G Systems. 72-77 - Elham Younesian, Miroslav Siklosi, Nabhan Khatib, Jiri Hosek:
Syslog Anomaly Detection Using Supervised Machine Learning Models. 78-84 - Sergey Vasilyev, Igor Levichev, Daniel Peres Acosta:
Dynamic pricing model for 5G/6G telecommunications. 85-90 - Viana C. C. Hilquias, Ivan S. Zaryadov:
Single-server Queuing Systems With Exponential Service Times and Threshold-based Renovation. 91-97 - Sergey Matyushenko, Anna Ermolayeva:
On stationary characteristics of a multiserver exponential queuing system with reordering of requests. 98-103 - Aliyu Bashir, Egor Machnev, Evgeniy Mokrov:
Queueing Model of Hysteretic Congestion Control for Cloud Wireless Sensor Networks. 104-108 - Vladimir Rykov, Nika M. Ivanova, Dmitry Kozyrev:
Risk tree as an assistant tool for the decision-maker. 109-114 - Maxim Mikhailovich Kovtsur, Anton Kistruga, Mikhailova Anastasiya, Pavel Andreevich Potemkin, Vladimir Volkogonov:
Research of wireless network traffic analysis using big data processing technology. 115-121 - Anton Vikulov, Alexander Paramonov:
Analysis of IEEE 802.11 signal propagation in different use cases. 122-130 - Grigoriy Fokin, Vladimir Sevidov:
Topology Search Using Dilution of Precision Criterion for Enhanced 5G Positioning Service Area. 131-136 - Grigoriy Fokin, Andrei Vladyko:
Vehicles Tracking in 5G-V2X UDN using Range, Bearing and Inertial Measurements. 137-142 - Marina Buranova, Ammar Muthanna:
Performance evaluation of software defined networking based on openflow protocol. 143-148 - Lukas Malina, Peter Cíbik, Petr Jedlicka, David Smekal, Sara Ricci, Jakub Hrabovsky:
Hardware-based Cryptographic Accelerator for Post Quantum Era. 149-155 - Vladimir Grozov, Alexei Guirik, Marina Budko, Mikhail Budko:
Construction of a Cryptographically Secure Pseudorandom Sequence Generator Based on the Blender Algorithm. 156-161 - Ivan K. Noskov, Sergei V. Bezzateev:
Modern McEliece Cryptosystem Using Generalized ($L, G$)-Codes. 162-166 - Jirí Pokorný, Pavel Seda, Jan Dvorak, Lukas Malina, Zdenek Martinasek:
The Security Testbed for the Purposes of the ITS-G5 Communication Attacks Prevention. 167-173 - Michal Mikulasek, Pavel Masek, Martin Stusek, Lukás Novák, Radek Mozny, Jiri Hosek:
Optimizing the Switching Speed of the Current Probe Utilizing the FPGA for Input Signal Processing. 174-181 - Jan Dvorak, David Kubánek, Jaroslav Koton:
FGIC44 - Fully Controllable Immittance Converter: Chip Performance Evaluation. 182-187 - Duc Tran Le, Truong Duy Dinh, Van-Dai Pham, Ruslan Kirichek, Egor Filin, Alexander Shestakov:
A Combined Attack Scenario to Exploit the Join Procedure of LoRaWAN. 188-193 - Phuc Hao Do, Truong Duy Dinh, Duc Tran Le, Van-Dai Pham, Lyudmila Myrova, Ruslan Kirichek:
An Efficient Feature Extraction Method for Attack Classification in IoT Networks. 194-199 - Dmitry Kukunin, Alexander Berezkin, Alina Zadorozhnyaya, Evgeny Karelin, Alexander Shestakov:
Model of Adaptive Data Transmission System. 200-205 - Vadim Bobrovsky, Anatoly Sartakov, Ruslan Kirichek, Van-Dai Pham, Leonid Semakov, Evgeny Zhuravel:
Improving the SNBWAN Efficiency based on the Improvement of Signal-Code Constructions. 206-213 - Artem A. Shvidkiy, Anastasiia A. Savelieva, Anton A. Zarubin:
Analysis of fault tolerance improvement in distributed over network data storage. 214-218 - Pavel I. Sharikov, Audrey Krasov, Artem Gelf, Ernest Birikh:
A Technique for Detecting the Substitution of a Java-Module of an Information System Prone to Pharming with Using a Hidden Embedding of a Digital Watermark Resistant to Decompilation. 219-223 - Evgeniy Glushankov, Konstantin Korovin, Ilya Gorobtsov, Igor Boyko, Dmitriy Kirik:
Optimization of Fan-Beam Radiation Pattern of Cylindrical Phased Array. 224-229 - Aleksandr Berezkin, Alina Zadorozhnyaya, Dmitry Kukunin, Daniil Matveev, Ekaterina Kraeva:
Models and Methods for Decoding of Error-Correcting Codes based on a Neural Network. 230-235 - Aleksey Slepnev, Evgenii Karelin, Ivan Luksha, Ruslan Kirichek, Alina Zadorozhnyaya, Eugene Makarov:
Virtualization of Control Systems in IoT using Neural Networks. 236-240 - Anis Maslo, Mujo Hodzic, Edvin Skaljo, Aljo Mujcic:
Machine Learning and Quality of Customer Experience in Leading Telecom Providers of Bosnia and Herzegovina. 241-245 - Nomarhinta Solihah, Muhammad Imam Nashiruddin, Erna S. Sugesti:
Regulatory Impact Analysis for XGS-PON Standardization Development in Indonesia. 246-252 - Kimio Oguchi:
Several Perspectives Of Broadband Home Networking Based On Optical Technologies. 253-258 - Petr Dejdar, Sobeslav Valach, Petr Munster:
Design and Development of FPGA-based Card for Data Acquisition and Processing for Use in Fiber Optics Perimeter Security Systems. 259-262 - Ondrej Klicnik, Petr Munster, Tomás Horváth, Jan Hajny, Lukas Malina:
Quantum Key Distribution Polygon. 263-266 - Pavel Záviska, Petr Dejdar, Petr Münster:
Comparison of image edge detection methods for intruder detection in a phase-sensitive OTDR system. 267-270 - Vladimir Spurny, Petr Munster, Tomás Horváth, Edvin Skaljo:
Leakage of Information Through Passive Components in Optical Fiber Infrastructures. 271-273 - Adebayo Emmanuel Abejide, Carla Rodrigues, Sushma Pandey, Madhava Reddy Kota, Mário J. N. Lima, António Luis Jesus Teixeira:
Analysis of signal extinction ratio and minimum mean launch power trade-off for type-A ONU 10G transmitter. 274-277 - Ahmed Galib Reza, Marcos Troncoso Costas, Liam P. Barry, Colm Browning:
54-Gbit/s PAM-8 Transmission in Next-Generation Passive Optical Networks using Directly Modulated Lasers with Machine Learning Techniques. 278-281 - Inna Kurbatska, Armands Ostrovskis, Sandis Spolitis, Vjaceslavs Bobrovs:
Impact of the receiver and transmitter bandwidth on the performance of high-speed OFDM signal in Radio-over-Fiber Communication Systems. 282-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.