2020. 3rd Issue
Volume XII, Number 3
Full issue (7,2 MB)
MESSAGE FROM THE EDITOR-IN-CHIEF
The wide scope of Infocommunications Journal is presented in the current, 2020 autumn issue. Unlike the previous special issues this year, readers with wide range of interest find articles in various topics: from signal processing through RFID anti-collision method comparisons, and about an application for educating children on ear protection. As 5G keeps being the hot topic in applied Infocommunications, our journal provides room for disseminating the latest results in this area, repeatedly.
PAPERS FROM OPEN CALL
Andrei A. Kalshchikov, Student Member IEEE, Vitaly V. Shtykov and Sergey M. Smolskiy, Member IEEE
The Processing Algorithm for Wideband Signals Propagating in Media with Frequency Dispersion
The new processing algorithm for wideband signals, which are propagating in frequency dispersion media, is developed in the context of the ground penetrating radar technology. The mathematical substantiation of offered method is presented on the base of linear functional spaces. The method is described for calculation acceleration on the base of the recursive approach. Results of numerical modeling of this method are presented for electromagnetic waves propagating in frequency dispersion media at utilization of chirp pulse signals. The Debye model is used as the model of electrical medium properties. The frequency dispersion of losses in the medium is taken into consideration at modeling. Results of operation modeling of the ground penetrating radar are described. Results of this paper will be useful for the ground penetrating radar technology and the ultrasonic flaw detection.
Chaofu Jing, Zhongqiang Luo, Yan Chen, and Xingzhong Xiong
Blind anti-collision methods for RFID system: a comparative analysis
Radio Frequency Identification (RFID) is one of the critical technologies of the Internet of Things (IoT). With the rapid development of IoT and the extensive use of RFID in our life, the step of RFID development should be faster. However, the tags in an RFID system are more and more utilized, both of them communicate in the same channel. The signal the reader received is mixed, and the reader cannot get the correct message the tags send directly. This phenomenon is often called a collision, which is the main obstacle to the development of the RFID system. Traditionally, the algorithm to solve the collision problem is called the anti-collision algorithm, the widely used anti-collision algorithm is based on Time Division Multiple Access (TDMA) like ALOHA-based and Binary search-based anti-collision algorithm. The principle of the TDMA-based anti-collision algorithm is to narrow the response of tags to one in each query time. These avoidance anti-collision algorithms performance poor when the number of tags is huge, thus, some researchers proposed the Blind Source Separation (BSS)-based anti-collision algorithm. The blind anti-collision algorithms perform better than the TDMA-based algorithms; it is meaningful to do some more research about this filed. This paper uses several BSS algorithms like FastICA, PowerICA, ICA_p, and SNR_MAX to separate the mixed signals in the RFID system and compare the performance of them. Simulation results and analysis demonstrate that the ICA_p algorithm has the best comprehensive performance among the mentioned algorithms. The FastICA algorithm is very unstable, and has a lower separation success rate, and the SNR_MAX algorithm has the worst performance among the algorithms applied in the RFID system. Some advice for future work will be put up in the end.
Dániel Szántó, Attila Zoltán Jenei, Miklós Gábriel Tulics and Klára Vicsi
Developing a Noise Awareness Rising Web Application within the “Protect your Ears” Project
Noise from our environment is causing evergreater problems such as hearing loss among the young. In many cases, children may be exposed to harmful noise even in the most common places such as schools and events. For this reason, we developed a web application in the frame the “Protect your Ears” project that aims the teaching of noise awareness. Playing with this web application helps children to be more aware in protecting their hearing. The web application was subjected to a cohort study where a test and control group was separated at an elementary school. The test group was able to use the web application for two weeks during the teaching sessions, while the control group could not. For objective measurement, the pedagogue used questionnaires before and after the examination. Statistical analyses were performed on the values obtained from the questionnaires. At the beginning of the study, we showed that the control and test groups were not heterogeneous at 5% significance level using the Mann Whitney U test. As a result, there was a significant difference between the preand post-condition for the test group using the Wilcoxon test at the 5% significance level compering to a control group. From this results, we can conclude that playing with the web application the children in the test group became more aware of the noise in their surrounding and mastered preventive behavior.
Detection of 2x2 MIMO signals
In this paper, we investigate synchronization and equalization of 2 x 2 MIMO signals. We make a step further than that is described in our patent. In the patent, 3 PLLs and a four-channel adaptive filter was needed. Here we decrease the number of PLLs to two and use an adaptive filter of only four channels. In addition to that, we shortly introduce the filter method and the FFT method as well, for synchronization. False detection cancellation is also mentioned. The so-called 1-bit technique has been compared to our method. After briefly introducing the ideas, detailed Matlab or AWR analyses follow. Input data are real measurements, so the analyses serve also as experimental verifications. We take a glimpse on higher order MIMO and higher order modulations as well.
Gábor Soós, Dániel Ficzere, Tamás Seres, Sándor Veress and István Németh
Business opportunities and evaluation of non-public 5G cellular networks – a survey
The family of cellular mobile telecommunications standards – including 5G – is mostly defined by the 3GPP standardizing organization. While these are well known in are unfamiliar with the concepts and the content of these documents. It is essential to define and designate how 5G is different from existing wired and wireless technologies, what are the main business benefits, and what are the key potential areas according to the new technology achievements. In our work, we present some fundamental aspects of the 5G business potential, where the key motives lay regarding the Industry 4.0 revolution and the innovation of 5G industrial architectures, including vendors, industrial players, and network operators.
Botond Tamás Csathó, Bálint Péter Horváth and Péter Horváth
Modeling the near-field of extremely large aperture arrays in massive MIMO systems
Massive multiple-input multiple-output (MIMO) is a key technology in modern cellular wireless communication systems to attain a very high system throughput in a dynamic multi-user environment. Massive MIMO relies on deploying base stations equipped with a large number of antenna elements. One possible way to deploy base stations equipped with hundreds or thousands of antennas is creating extremely large aperture arrays. In this paper, we investigate channel modeling aspects of massive MIMO systems with large aperture arrays, in which many users are located in the near-field of the aperture. Oneand two-dimensional antenna geometries, different propagation models, and antenna element patterns are compared in terms of inter-user correlation, condition number of the multi-user channel matrix, and spectral efficiency to identify key design parameters and essential modeling assumptions. As our analysis reveals by choosing spectral-efficiency as a design objective, the size of the aperture is the critical design parameter.
CALL FOR PAPERS
DRCN 2021 / 17th International Conference on Design of Reliable Communication Networks
IEEE ComSoc, Milan, Italy
WFIoT2021 / 7th IEEE World Forum on the Internet of Things
IEEE World Forum, New Orleans, Louisiana, USA
2020. 2nd Issue
Volume XII, Number 2
Full issue (10,4 MB)
MESSAGE FROM THE GUEST EDITORS
Special Issue on Quality Achievements at BME-VIK with Student Contributions in EFOP-3.6.2-16-013 – Guest Editorial
The project EFOP-3.6.2-16-013, "Thematic Research Collaborations for Innovative Informatics and Infocommunication Solutions" (abbreviated as 3IN) started in September 2017. The abbreviation refers to the three participating institutions, Eötvös Loránd University (ELTE), Budapest University of Technology and Economics (BME), and Pázmány Péter Catholic University (PPKE), and to the three innovation areas in focus: Software Development and Information Security (A / Pillar), Infocommunication Networks and Cyberphysical Systems (B / Pillar) and Intelligent Data Analysis (C / Pillar).
Csaba Simon, Markosz Maliosz, Miklós Máté, Dávid Balla and Kristóf Torma
Sidecar based resource estimation method for virtualized environments
The widespread use of virtualization technologies in telecommunication system resulted in series of benefits, as flexibility, agility and increased resource usage efficiency. Nevertheless, the use of Virtualized Network Functions (VNF) in virtualized modules (e.g., containers, virtual machines) also means that some legacy mechanisms that are crucial for a telco grade operation are no longer efficient. Specifically, the monitoring of the resource sets (e.g., CPU power, memory capacity) allocated to VNFs cannot rely anymore on the methods developed for earlier deployment scenarios. Even the recent monitoring solutions designed for cloud environments is rendered useless if the VNF vendor and the telco solution supplier has to deploy its product into a virtualized environment, since it does not have access to the host level monitoring tools. In this paper we propose a sidecar-based solution to evaluate the resources available for a virtualized process. We evaluated the accuracy of our proposal in a proof of concept deployment, using KVM, Docker and Kubernetes virtualization technologies, respectively. We show that our proposal can provide real monitoring data and discuss its applicability.
Ádám Marosits, Ágoston Schranz and Eszter Udvary
Amplified spontaneous emission based quantum random number generator
There is an increasing need for true random bits, for which true random number generators (TRNG) are absolutely necessary, because the output of pseudo random number generators is deterministically calculated from the previous states. We introduce our quantum number generator (QRNG) based on amplified spontaneous emission (ASE), a truly random quantum physical process. The experimental setup utilizes the randomness of the process. In this system, optical amplifiers (based on ASE) play the major role. The suitable sampling rate is selected in order to build the fastest generator, while avoiding the correlation between consecutive bits. Furthermore, the applied post-processing increases the quality of the random bits. As a results of this, our system generated random bits which successfully passed the NIST tests. Our real-time generation system – which is currently a trial version implemented with cheap equipment – will be available for public use, generating real time random bits using a web page.
David Kobor and Eszter Udvary
Optimisation of Optical Network for Continuous-Variable Quantum Key Distribution by Means of Simulation
The unprecedented breakthrough in the field of quantum computing in the last several years is threatening with the exploitation of our current communication systems. To address this issue, researchers are getting more involved in finding methods to protect these systems. Amongst other tools, quantum key distribution could be a potentially applicable way to achieve the desired level of protection. In this paper we are evaluating the physical layer of an optical system realising continuous variable quantum key distribution (CVQKD) with simulations to determine its weak points and suggest methods to improve them. We found that polarisation dependent devices are crucial for proper operation, therefore we determined their most defining parameters from the point of operation and suggested extra optical devices to largely improve transmission quality. We also paid attention to polarisation controlling in these sort of systems. Our findings could be valuable as practical considerations to construct reliable CVQKD optical transmission links.
Gergő Ládi, Levente Buttyán and Tamás Holczer
GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference For Binary Protocols, Using Recorded Network Traffic
Protocol specifications describe the interaction between different entities by defining message formats and message processing rules. Having access to such protocol specifications is highly desirable for many tasks, including the analysis of botnets, building honeypots, defining network intrusion detection rules, and fuzz testing protocol implementations. Unfortunately, many protocols of interest are proprietary, and their specifications are not publicly available. Protocol reverse engineering is an approach to reconstruct the specifications of such closed protocols. Protocol reverse engineering can be tedious work if done manually, so prior research focused on automating the reverse engineering process as much as possible. Some approaches rely on access to the protocol implementation, but in many cases, the protocol implementation itself is not available or its license does not permit its use for reverse engineering purposes. Hence, in this paper, we focus on reverse engineering protocol specifications relying solely on recorded network traffic. More specifically, we propose GrAMeFFSI, a method based on graph analysis that can infer protocol message formats as well as certain field semantics for binary protocols from network traces. We demonstrate the usability of our approach by running it on packet captures of two known protocols, Modbus and MQTT, then comparing the inferred specifications to the official specifications of these protocols.
Dávid Papp, Zsolt Knoll and Gábor Szűcs
Graph construction with condition-based weights for spectral clustering of hierarchical datasets
Most of the unsupervised machine learning algorithms focus on clustering the data based on similarity metrics, while ignoring other attributes, or perhaps other type of connections between the data points. In case of hierarchical datasets, groups of points (point-sets) can be defined according to the hierarchy system. Our goal was to develop such spectral clustering approach that preserves the structure of the dataset throughout the clustering procedure. The main contribution of this paper is a set of conditions for weighted graph construction used in spectral clustering. Following the requirements – given by the set of conditions – ensures that the hierarchical formation of the dataset remains unchanged, and therefore the clustering of data points imply the clustering of point-sets as well. The proposed spectral clustering algorithm was tested on three datasets, the results were compared to baseline methods and it can be concluded the algorithm with the proposed conditions always preserves the hierarchy structure.
Csongor Pilinszki-Nagy and Bálint Gyires-Tóth
Performance Analysis of Sparse Matrix Representation in Hierarchical Temporal Memory for Sequence Modeling
Hierarchical Temporal Memory (HTM) is a special type of artificial neural network (ANN), that differs from the widely used approaches. It is suited to efficiently model sequential data (including time series). The network implements a variable order sequence memory, it is trained by Hebbian learning and all
of the network’s activations are binary and sparse. The network consists of four separable units. First, the encoder layer translates the numerical input into sparse binary vectors. The Spatial Pooler performs normalization and models the spatial features of the encoded input. The Temporal Memory is responsible for learning the Spatial Pooler’s normalized output sequence. Finally, the decoder takes the Temporal Memory’s outputs and translates it to the target. The connections in the network are also sparse, which requires prudent design and implementation. In this paper a sparse matrix implementation is elaborated, it is compared to the dense implementation. Furthermore, the HTM’s performance is evaluated in terms of accuracy, speed and memory complexity and compared to the deep neural network-based LSTM (Long Short-Term Memory).
István Fábián and Gábor György Gulyás
De-anonymizing Facial Recognition Embeddings
Advances of machine learning and hardware getting cheaper resulted in smart cameras equipped with facial recognition becoming unprecedentedly widespread worldwide. Undeniably, this has a great potential for a wide spectrum of uses, it also bears novel risks. In our work, we consider a specific related risk, one related to face embeddings, which are machine learning created metric values describing the face of a person. While embeddings seems arbitrary numbers to the naked eye and are hard to interpret for humans, we argue that some basic demographic attributes can be estimated from them and these values can be then used to look up the original person on social networking sites. We propose an approach for creating synthetic, life-like datasets consisting of embeddings and demographic data of several people. We show over these ground truth datasets that the aforementioned re-identifications attacks do not require expert skills in machine learning in order to be executed. In our experiments, we find that even with simple machine learning models the proportion of successfully re-identified people vary between 6.04% and 28.90%, depending on the population size of the simulation.
Levente Alekszejenkó and Tadeusz Dobrowiecki
Adapting IT Algorithms and Protocols to an Intelligent Urban Traffic Control
Autonomous vehicles, communicating with each other and with the urban infrastructure as well, open opportunity to introduce new, complex and effective behaviours to theintelligent traffic systems. Such systems can be perceived quite naturally as hierarchically built intelligent multi-agent systems, with the decision making based upon well-defined and profoundly tested mathematical algorithms, borrowed e.g. from the field of information technology. In this article, two examples of how to adapt such algorithms to the intelligent urban traffic are presented. Since the optimal and fair timing of the traffic lights is crucial in the traffic control, we show how a simple Round-Robin scheduler and Minimal Destination Distance First scheduling (adaptation of the theoretically optimal Shortest Job First scheduler) were implemented and tested for traffic light control. Another example is the mitigation of the congested traffic using the analogy of the Explicit Congestion Notification (ECN) protocol of the computer networks. We show that the optimal scheduling based traffic light control can handle roughly the same complexity of the traffic as the traditional light programs in the nominal case. However, in extraordinary and especially fastly evolving situations, the intelligent solutions can clearly outperform the traditional ones. The ECN based method can successfully limit the traffic flowing through bounded areas. That way the number of passing-through vehicles in e.g. residential areas may be reduced, making them more comfortable congestion-free zones in a city.
Dóra Varnyú and László Szirmay-Kalos
Comparison of Non-Linear Filtering Methods for Positron Emission Tomography
As a result of the limited radiotracer dose, acquisition time and scanner sensitivity, positron emission tomography (PET) images suffer from high noise. In the current clinical practice, post-reconstruction filtering has become one of the most common noise reduction techniques. However, the range of existing filters is very wide, and choosing the most suitable filter for a given measurement is far from simple. This paper aims to provide assistance in this choice by comparing the most powerful image denoising filters, covering both image quality and execution time. Emphasis is placed on non-linear techniques due to their ability to preserve edges and fine details more accurately than linear filters. The compared methods include the Gaussian, the bilateral, the guided, the anisotropic diffusion and the non-local means filters, which are examined in both static and dynamic PET reconstructions.
CALL FOR PAPERS
17th IFIP/IEEE International Symposium on Integrated Network and Service Management
IEEE IM 2021, Bordeaux, France
IEEE International Conference on Communications
IEEE ICC 2021, Montreal, QC, Canada